Описание
secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exceptional URL" in the query string, as demonstrated by the http://should-have-been-filtered.example.com/?http://google.com URL.
Ссылки
- ExploitTechnical DescriptionThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:samsung:galaxy_s6_firmware:g920fxxu2coh2:*:*:*:*:*:*:*
cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:samsung:galaxy_note_3_firmware:n9005xxugbob6:*:*:*:*:*:*:*
cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*
EPSS
Процентиль: 24%
0.00079
Низкий
3.3 Low
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 3.3
github
больше 3 лет назад
secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exceptional URL" in the query string, as demonstrated by the http://should-have-been-filtered.example.com/?http://google.com URL.
EPSS
Процентиль: 24%
0.00079
Низкий
3.3 Low
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-20