Description
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
Published: 2014-07-09
Score: 4.3 Medium
EPSS: 35.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-363h-vj6q-3cmj Rosetta-Flash JSONP Vulnerability in hapi
History

No history.

Subscriptions

Adobe Adobe Air Adobe Air Sdk Flash Player
Apple Mac Os X
Linux Linux Kernel
Microsoft Windows
Redhat Rhel Extras
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T11:27:36.060Z

Reserved: 2014-06-26T00:00:00.000Z

Link: CVE-2014-4671

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-07-09T05:04:24.960

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-4671

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-07-08T00:00:00Z

Links: CVE-2014-4671 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses