Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/12/2009
01:20 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Adobe Flash Security Model Permits Malware

Web sites that allow user-generated content could be risking attack due to Flash's permissive security model.

A security researcher at Foreground Security has identified a flaw in the way Web browsers handle Adobe Flash files that could be used to compromise Web sites that allow users to submit content.

The flaw involves a way to exploit the same-origin policy of Adobe Flash to upload and serve malicious files.

The same-origin policy restricts Flash objects so that they can only access content from their domain of origin. The vulnerability arises from the fact that Flash objects on your server will execute in the context of your domain.

"The short version of all this, of course, is that if I can convince a server to serve up a file on my behalf, I can use that file to attack the server," said Foreground Security researcher Mike Bailey in a blog post.

Bailey has posted screen shots demonstrating the vulnerability by uploading and executing Flash (SWF) files using cPanel's File Manager and the Squirrelmail Web e-mail client. In a video posted on YouTube, he demonstrates how he used the vulnerability to attack Gmail.

"[A]ctually exploiting this is extremely tricky, as there are a lot of hoops to jump through," he said in a blog post, referring to Gmail. "It required uploading the SWF to my own account, then logging the victim into that account (via CSRF), loading the SWF into the browser, logging them out, and enticing the user to log in while keeping the original page loaded (eg. in another browser tab). Not simple, and that's the simplified version, but it worked beautifully."

Google has addressed the issue by blocking the CSRF login vector and now appears to be fairly well protected against Bailey's attack. Bailey, however, has posted information about proof-of-concept attacks against Google's recently added CSRF protection measures.

"We used Gmail as an example because we know that it was fixed," said Mike Murray, CISO at Foreground, in a phone interview. "The problem with this vulnerability is that a whole lot of people are vulnerable. Millions of sites are vulnerable."

Unfortunately, there's no easy fix. Adobe could address the issue by making its content policy restrictive rather than permissive, but Murray claims the company doesn't want to do so. "Adobe is afraid of breaking all of their customers' Web sites," he said.

Adobe maintains that Flash is safe if used properly.

"By nature, Flash (SWF) content is powerful, active content and should be handled with the same care as other active content technologies, such as JavaScript, to ensure a site's design does not become vulnerable to abuse scenarios," an Adobe spokesperson said in an e-mail. "Adobe has always advised that allowing arbitrary uploads or attachments of Flash (SWF) content to trusted domains should not be performed due to potential abuse scenarios, such as the ones outlined by Mike Bailey."

Adobe has published security guidance for safely hosting Flash content, the spokesperson said.

Web site owners can mitigate the risk by serving all user-supplied content from a separate domain. According to Bailey, a number of major Web sites like Yahoo Mail, Hotmail, and Wikipedia already do this.

Bailey suggests that user-generated Flash (SWF) files can be served using a "content-Disposition: attachment" header to prevent them from executing when embedded in a Web page. This is a new addition to Flash 10.0.0.2.

"On the user side there's very little you can do, other than completely disabling Flash," said Bailey.

Update: Added Adobe comment.

How are you dealing with data-centric security? Answer our survey by Friday, Nov. 13, and be eligible to win an iPod Touch. Click here to take part.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4245
PUBLISHED: 2019-12-11
Orca has arbitrary code execution due to insecure Python module load
CVE-2013-4593
PUBLISHED: 2019-12-11
RubyGem omniauth-facebook has an access token security vulnerability
CVE-2013-6495
PUBLISHED: 2019-12-11
JBossWeb Bayeux has reflected XSS
CVE-2013-7370
PUBLISHED: 2019-12-11
node-connect before 2.8.2 has cross site scripting in methodOverride Middleware
CVE-2019-18935
PUBLISHED: 2019-12-11
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote cod...