A Serious weakness has been found in the Android default browser(aosp) that permits a noxious site to sidestep "Same Origin Policy(sop)" and take client's information from different sites opened in different tabs. AOSP program is the default program in Android adaptations more established than 4.4.
What is Same Origin Policy?
SOP assumes an essential part in the Web Security, confines a site from getting to scripts and information put away by different sites. Case in point, the approach confines a site "Y" from getting to the treats put away by site "X" in client's program.
Same Origin Policy Bypass:
Rafay Baloch, a Origin Policy" framework utilized by the AOSP program. The bug permits the site "Y" to get to the scripts and client's information put away by site 'Y'.
Envision You are going to aggressor's site while your webmail is opened in an alternate tab, the assailant is currently ready to take your email information or he can take your treats and could utilize it to trade off your mail account.
Verification of Concept:
<iframe name="test" src="http://www.example.com"></iframe>
<input type=button value="test"
onclick="window.open('\u0000javascript:alert(document.domain)','test')" >
"Its in light of the fact that when the parser experiences the invalid bytes, it imagines that the string has been ended, on the other hand it hasn't been, which as I would like to think heads whatever remains of the announcement becoming accomplished. Rafay explained in his on the internet log.
Metasploit Module:
Rafay distributed the poc on his online journal in August. Notwithstanding, it remained generally unnoticed until rapid7 discharged a metasploit module that adventures the powerlessness.
http://www.rapid7.com/db/modules/assistant/accumulate/android_stock_browser_uxss
This program likewise known for the remote code execution weakness, has been ceased by Google. However more seasoned renditions of Android do accompany this program.
What you should to do?
Stop utilizing the default android program, Use Google Chrome or Mozilla.