Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j2q3-jgq8-88q2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.

The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.

EPSS

Процентиль: 99%
0.77565
Высокий

Связанные уязвимости

nvd
больше 11 лет назад

The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser.

EPSS

Процентиль: 99%
0.77565
Высокий