secfilter in the Samsung kernel for Android on SM-N9005 build N9005XXUGBOB6 (Note 3) and SM-G920F build G920FXXU2COH2 (Galaxy S6) devices allows attackers to bypass URL filtering by inserting an "exceptional URL" in the query string, as demonstrated by the http://should-have-been-filtered.example.com/?http://google.com URL.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0003 | Exploit Technical Description Third Party Advisory | 
| https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0003 | Exploit Technical Description Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0003 - Exploit, Technical Description, Third Party Advisory | 
Information
                Published : 2017-04-13 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-2567
Mitre link : CVE-2016-2567
CVE.ORG link : CVE-2016-2567
JSON object : View
Products Affected
                samsung
- galaxy_s6
- galaxy_note_3_firmware
- galaxy_note_3
- galaxy_s6_firmware
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
