Dark Mode
Capec-178 Detail
Cross-Site Flashing
Detailed Social Engineering Software Likelihood: Medium Typical Severity: Medium
Parents: 182
Threats: T290
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-178 | capec | https://capec.mitre.org/data/definitions/178.html | |
| CWE-601 | cwe | http://cwe.mitre.org/data/definitions/601.html | |
| REF-41 | reference_from_CAPEC | http://www.wisec.it/en/Docs/flash_App_testing_Owasp07.pdf | Stefano Di Paola, Testing Flash Applications, 2007 |
| REF-42 | reference_from_CAPEC | https://www.owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/08-Testing_for_Cross_Site_Flashing.html | OWASP Web Security Testing Guide, The Open Web Application Security Project (OWASP) |
| REF-561 | reference_from_CAPEC | http://doc.cenzic.com/sadoc9x14ba847/CPL0001509.htm | Cross-Site Flashing, Trustwave |
Explore
-
Identification: Using a browser or an automated tool, an attacker records all instances of URLs (or partial URL such as domain) passed to a flash file (SWF).
| Techniques |
|---|
| Use an automated tool to record the variables passed to a flash file. |
| Use a browser to manually explore the website and analyze how the flash file receive variables, e.g. JavaScript using SetVariable/GetVariable, HTML FlashVars param tag, etc. |
| Use decompilers to retrieve the flash source code and record all user-controllable variables passed to a loadMovie* directive. |
Experiment
-
Attempt to inject a remote flash file: The attacker makes use of a remotely available flash file (SWF) that generates a uniquely identifiable output when executed inside the targeted flash file.
| Techniques |
|---|
| Modify the variable of the SWF file that contains the remote movie URL to the attacker controlled flash file. |
Exploit
-
Access or Modify Flash Application Variables: As the attacker succeeds in exploiting the vulnerability, they target the content of the flash application to steal variable content, password, etc.
-
Execute JavaScript in victim's browser: When the attacker targets the current flash application, they can choose to inject JavaScript in the client's DOM and therefore execute cross-site scripting attack.
| Techniques |
|---|
| Develop malicious Flash application that is injected through vectors identified during the Experiment Phase and loaded by the victim browser's flash plugin and sends document information to the attacker. |
| Develop malicious Flash application that is injected through vectors identified during the Experiment Phase and takes commands from an attacker's server and then causes the flash application to execute appropriately. |
| Techniques |
|---|
| Develop malicious JavaScript that is injected from the rogue flash movie to the targeted flash application through vectors identified during the Experiment Phase and loaded by the victim's browser. |
- The targeted Flash application must reference external URLs and the locations thus referenced must be controllable through parameters. The Flash application must fail to sanitize such parameters against malicious manipulation. The victim must follow a crafted link created by the attacker.
Not present
| Medium |
|---|
| knowledge of Flash internals, parameters and remote referencing. |
| Integrity | Authorization | Access Control | Accountability | Authentication | Confidentiality | Non-Repudiation |
|---|---|---|---|---|---|---|
| Modify Data | Execute Unauthorized Commands (Run Arbitrary Code) | Bypass Protection Mechanism | Gain Privileges | Gain Privileges | Read Data | Gain Privileges |
| Gain Privileges | ||||||
| Bypass Protection Mechanism |
- The attacker tries to get their malicious flash movie to be executed in the targeted flash application. The malicious file is hosted on the attacker.com domain and the targeted flash application is hosted on example.com The crossdomain.xml file in the root of example.com allows all domains and no specific restriction is specified in the targeted flash application. When the attacker injects their malicious file in the vulnerable flash movie, the rogue flash application is able to access internal variables and parameter of the flash movie.