First published: Thu Apr 13 2017(Updated: )
secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exceptional URL" in the query string, as demonstrated by the http://should-have-been-filtered.example.com/?http://google.com URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S6 Firmware | =g920fxxu2coh2 | |
Samsung Galaxy S6 | ||
Samsung Galaxy Note 3 Firmware | =n9005xxugbob6 | |
Samsung Galaxy Note 3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.