Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a '$' (dollar sign) or '(' (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-18.html - Patch, Vendor Advisory | |
References | () http://miki.it/blog/2014/8/15/adobe-really-fixed-rosetta-flash-today/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95418 - |
Information
Published : 2014-08-19 11:16
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5333
Mitre link : CVE-2014-5333
CVE.ORG link : CVE-2014-5333
JSON object : View
Products Affected
adobe
- adobe_air
- adobe_air_sdk
- flash_player
linux
- linux_kernel
- android
apple
- mac_os_x
microsoft
- windows
CWE
CWE-352
Cross-Site Request Forgery (CSRF)