Vulnerability & Exploit Database

Back to search

Samsung Internet Browser SOP Bypass

This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/gather/samsung_browser_sop_bypass

Authors

  • Dhiraj Mishra
  • Tod Beardsley
  • Jeffrey Martin

References

Actions

  • WebServer

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/gather/samsung_browser_sop_bypass msf auxiliary(samsung_browser_sop_bypass) > show actions ...actions... msf auxiliary(samsung_browser_sop_bypass) > set ACTION <action-name> msf auxiliary(samsung_browser_sop_bypass) > show options ...show and set options... msf auxiliary(samsung_browser_sop_bypass) > run