-
Notifications
You must be signed in to change notification settings - Fork 108
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
XSS vulnerability in recorder.swf #23
Comments
Thanks for attention. As I understand the only possible attack scenario is to include malicious code while embedding recorder swf. For embedding swf, hacker needs access to put However I'd like to fix this "bug". My idea is to validate string given as "eventHandler" to allow only names of function. var requirement:RegExp = /\A\w+\z/;
if (requirement.test(eventHandler)) {
recorderInterface.eventHandler = eventHandler;
} |
@Miladbr I'll be grateful for your feedback. |
Hmm, Actually there is no difference between usual XSS and Flash based XSS. Consider that recorder.swf is hosted in xyz.com, when someone (silently by a hidden iframe) open "http://xyz.com/recorder.swf?event_handler=malicious_JavaScript_here" JavaScript will be executed in context of xyz.com. |
I'm merging pull request mentioned above (pull request #25) as temporary patch. In next release we'll include complete solution, which break backward compatibility. Flash will expect specific JavaScript function to be defined in global context e.g. |
Vulnerable Code:
The text was updated successfully, but these errors were encountered: