Affected Vendor: | Adobe |
---|---|
Affected Products: | Flash Player ActiveX Control for Internet Explorer |
Affected Versions: | Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier, and 7.0.70.0 and earlier. |
Vendor Response: | http://www.adobe.com/support/security/bulletins/apsb07-20.html |
Discovered by: | Adam Barth and Collin Jackson, Stanford University |
This vulnerability allows remote attackers to run arbitrary JavaScript code in the security context of other domains, resulting in information disclosure and session hijacking. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists in the Flash Player ActiveX Control's
handling of the navigateToURL
API, which takes two
arguments, a URL and the name of the frame to be navigated. The SWF
movie can pass in a javascript:
URI and the name of a
frame on some other domain. The code in the URI executes in the
security context of the named frame, rather than the security context
of the SWF movie or the page that embeds it.
If you are using Internet Explorer and have a vulnerable version of Flash Player installed, this demo will alert you with the target URL's cookie and content.
Flash source