The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.
References
Configurations
History
21 Nov 2024, 02:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html - Exploit | |
References | () http://www.securityfocus.com/bid/69548 - | |
References | () https://android.googlesource.com/platform/external/webkit/+/1368e05e8875f00e8d2529fe6050d08b55ea4d87 - | |
References | () https://android.googlesource.com/platform/external/webkit/+/7e4405a7a12750ee27325f065b9825c25b40598c - | |
References | () https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95693 - | |
References | () https://news.ycombinator.com/item?id=8321185 - | |
References | () https://news.ycombinator.com/item?id=8325807 - |
Information
Published : 2014-09-02 10:55
Updated : 2024-11-21 02:13
NVD link : CVE-2014-6041
Mitre link : CVE-2014-6041
CVE.ORG link : CVE-2014-6041
JSON object : View
Products Affected
- android_browser
CWE
CWE-264
Permissions, Privileges, and Access Controls