Flash Bug Prompts Calls for Code Rewriting

LOS ANGELES – According to Google, hundreds of thousands of vulnerable Flash files are currently on the Internet, including files found at a large number of major websites.

The danger stems from a Cross-Site Scripting (XSS) exploit of Shockwave Flash (SWF) files generated by most of the programs that create Flash applets that allows attackers to access data on targeted websites; such as usernames and passwords, or even performing unauthorized online banking transactions.

The problem may be particularly acute for adult website operators, who have increasingly made use of Flash technology in advertisements and video files and often rely on Adobe's popular DreamWeaver software for website development – one of the tools that generate the vulnerable files.

"If a web application is vulnerable to XSS, and an attacker lures a user of the vulnerable web application to click on a link, then the attacker gains complete control of the user's session in the web application," Google's Rich Cannings wrote. "The attacker can use JavaScript to perform any action on behalf of the user (for example, perform a transaction on an online banking system) or change the way the website appears to the user (for example, perform a phishing attack)."

While security experts have warned of additional vulnerabilities, the XSS exploit was made public after companies such as Adobe updated their software to eliminate the bug.

Now, experts are recommending that all existing Flash files be removed from websites until they can be regenerated with the newest versions of these tools to address the issue.

Cannings also recommends that SWF files be served from numbered IP addresses or from separate domains from the site that features the Flash files.

"If there's an issue on a bank, the impact of an XSS is pretty large," Cannings said. "In other words, it's a huge amount of work, but well worth it for trusted sites that want to remain that way."

Expanding on the causes of the vulnerability, Cannings reported that DreamWeaver's "skinName" parameter can be used to load URLs containing the "asfunction" handler; while Adobe Acrobat Connect makes files that do not validate the "baseurl" parameter, which can allow malicious scripts to be injected into targeted websites.

The complete report can be read here.

Related:  

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

New Fansly Analytics Platform 'SlyKiwi' Launches

SlyKiwi, a new analytics platform exclusively designed for Fansly content, has officially launched.

FPNCash Appoints Kimi Evans Head of Business Development

FPNCash has appointed Kimi Evans as its new head of business development.

CamModelDirectory Launches Platform Upgrade

CamModelDirectory has launched its CMD 3.0 platform upgrade.

AEBN Publishes Popular Searches by Country for June, July

AEBN has released the list of popular searches from its straight and gay theaters by country in June and July.

Playboy to Move Global HQ to Miami Beach

Playboy announced today that it will be moving its global corporate headquarters from Los Angeles to Miami Beach.

Bellesa Plus Names Magalie Rheaut as Chief Growth Officer

Bellesa Plus has named Magalie Rheaut as its Chief Growth Officer.

PASS to Relaunch Performer Subsidy Fund

PASS has announced that it will relaunch the Performer Subsidy Fund (PSF) to cover sexually transmitted infection (STI) test panel costs for up to 10 people each month.

Pineapple Support Taps Austin Ponce as Brand Ambassador

Pineapple Support has named Austin Ponce as its newest brand ambassador.

Taylor Vixxen Stars in New DezyRed Interactive VR Game

Taylor Vixxen stars in an interactive VR game from DezyRed.

XBIZ Amsterdam's Jakarta Hotel Sold Out, Additional Hotels Announced

Guest rooms at XBIZ Amsterdam’s host conference venue, Jakarta Hotel, are now completely sold out.

Show More