A SOP bypass vulnerability has been found in Android browser < 4.4.1 (Qmobile) and below and later verified with Galaxy S3, HTC wildfire, Sony Xperia, Qmobile etc. The issue occurred to the best of my knowledge of my, the issue occurred due to improper handling of nullbytes by a web search engine. The following is a proof of the concept of a bypassed SOP by sending the response to an attacker's controlled domain. We can only bypass SOP here when the site could be framed using the sandbox attribute introduced as a part of HTML5 specifications."] Source: http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html

