Adobe Integrated Runtime (AIR, aka Apollo) allows context-dependent attackers to modify arbitrary files within an executing .air file (compiled AIR application) and perform cross-site scripting (XSS) attacks, as demonstrated by an application that modifies an HTML file inside itself via JavaScript that uses an APPEND open operation and the writeUTFBytes function. NOTE: this may be an intended consequence of the AIR permission model; if so, then perhaps this issue should not be included in CVE.
Advisories
Source ID Title
EUVD EUVD EUVD-2007-3624 Adobe Integrated Runtime (AIR, aka Apollo) allows context-dependent attackers to modify arbitrary files within an executing .air file (compiled AIR application) and perform cross-site scripting (XSS) attacks, as demonstrated by an application that modifies an HTML file inside itself via JavaScript that uses an APPEND open operation and the writeUTFBytes function. NOTE: this may be an intended consequence of the AIR permission model; if so, then perhaps this issue should not be included in CVE.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T14:21:36.572Z

Reserved: 2007-07-09T00:00:00

Link: CVE-2007-3640

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-07-10T00:30:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-3640

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses