Dolphin Browser for Android | Security Research Advisory | VerSprite Dolphin Browser for Android | Security Research Advisory | VerSprite

Home  |  Research  |  Resources  |  Advisories  |  Dolphin Browser for Android

Dolphin Browser for Android

Arbitrary File Write






Dolphin Browser for Android

Product version

< 12.0.2

Vulnerability Details

The Backup and Restore feature in Mobotap's Dolphin Browser for Android 12.0.2, suffers from an arbitrary file write vulnerability when attempting to restore browser settings from a malicious Dolphin Browser backup file. This arbitrary file write vulnerability, allows an attacker to overwrite a specific executable in the Dolphin Browser's data directory with a crafted malicious executable. Every time the Dolphin Browser is launched, it will attempt to run the malicious executable from disk, thus executing the attacker's code.

Learn More →

Vendor response

Mobotap has not issued a reponse nor an update to remediate this vulnerability.

Disclosure timeline

2017-11-28 - Reached out on Twitter and asked to speak with someone who is responsible for product security
2017-12-04 - Emailed requesting to speak with someone who can address security issues in the Dolphin Browser for Android, no response
2017-12-07 - Emailed to verify initial email was received, no response
2017-12-10 - Emailed to inform the public release of an advisory, CC'ed [email protected] and received a bounce on the email address
2017-12-11 - Public zero day release of advisory

Offensive Minded Security Exploit Development

We are an international squad of professionals working as one.