Adobe cve-2 0 1 1-2 4 6 1 vulnerability can still be exploited-vulnerability warning-the black bar safety net

2015-03-25T00:00:00
ID MYHACK58:62201560302
Type myhack58
Reporter 佚名
Modified 2015-03-25T00:00:00

Description

A There have been four years of Adobe Flash patch did not correctly resolve the Flex application vulnerable issue, and the attacker still can exploit this vulnerability. Reportedly, this vulnerability affects the world Alexa rank of the top ten most popular sites in the 3 0 percent.

Linkedln Security Institute Luca Carettoni and Minded security consultants Mauro Gentile's research shows that even the Web browser and Flash plugin have been updated, Shockwave Flash file using the Flex software development tool is a compile-time or can be utilized.

An Adobe spokesperson told Threadpost, Adobe has been aware of the road Flex application problems, and in 2 0 1 1 year released a tool to solve this problem.

The researchers published proof that the software easily be attacks part of the details. They plan to in the near future to release this exploit to the full details and some proof of concept development, they are very confident this method can make the public more aware of this vulnerability. Carettoni and Gentile has been notified of these vulnerable website maintenance and Adobe company.

If you use the method correctly, this vulnerability can allow an attacker to forge the same of the original request from the affected system to steal information, even on behalf of the user through cross site request forgery in user platform running on the insecure version. In both cases, the attacker will force victim user to visit a malicious Web page.

In other words, the researchers think that have a full patch of the Web browser and plug-ins, hosting the vulnerable SWF file will lead indirectly to the same-origin policy bypass.

“Realistically speaking, it is possible to force the affected Flash movie be homologous to the request, and give the attacker returns the response back,”the two researchers in a blog post said. “Since the HTTP request contains a cookie and is from the victim's domain is issued, the HTTP response may contain private information, including anti-CSRF token and the user data.”

Potential mitigation measures include re-compiled with a static library for Flex SDK, Adobe official in 2 0 1 1 years of the release of the patch tool, and if you do not use simply remove this unsafe manner.

You can find Carettoni and Gentile in the respective website of the analysis of the data, although these are repost, but these two reports contain the same content.