module

Samsung Internet Browser SOP Bypass

Disclosed
2017-11-08
Created
2018-06-14

Description

This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the
Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices.
By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather
credentials via a fake pop-up.

Authors

Dhiraj Mishra
Tod Beardsley
Jeffrey Martin

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/gather/samsung_browser_sop_bypass
msf auxiliary(samsung_browser_sop_bypass) > show actions
...actions...
msf auxiliary(samsung_browser_sop_bypass) > set ACTION < action-name >
msf auxiliary(samsung_browser_sop_bypass) > show options
...show and set options...
msf auxiliary(samsung_browser_sop_bypass) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.