Description
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-363h-vj6q-3cmj | Rosetta-Flash JSONP Vulnerability in hapi |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:27:36.060Z
Reserved: 2014-06-26T00:00:00.000Z
Link: CVE-2014-4671
No data.
Status : Modified
Published: 2014-07-09T05:04:24.960
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-4671
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA