From 95e2f1da9542fd33f28a15e2212c84d2b1c0d920 Mon Sep 17 00:00:00 2001 From: RootUp Date: Sun, 17 Dec 2017 11:02:24 +0530 Subject: [PATCH] Update samsung_browser_sop_bypass.md --- .../modules/auxiliary/gather/samsung_browser_sop_bypass.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md b/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md index 811c9654d8..e3d883c189 100644 --- a/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md +++ b/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md @@ -2,7 +2,7 @@ This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser (CVE-2017-17692), a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up and the gather credentials is stored in `creds` ## Vulnerable Application -This Modules was tested on Samsung Internet Browser 5.4.02.3 during development of this module. +This Module was tested on Samsung Internet Browser 5.4.02.3 during development. ## Verification Steps 1. Start `msfconsole -q`