Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 137 | Parameter Injection |
ParentOf | D | 174 | Flash Parameter Injection |
ParentOf | D | 178 | Cross-Site Flashing |
CanAlsoBe | M | 248 | Command Injection |
Find Injection Entry Points
The attacker first takes an inventory of the entry points of the application.
Technique |
---|
Spider the website for all available URLs that reference a Flash application. |
List all uninitialized global variables (such as _root.*, _global.*, _level0.*) in ActionScript, registered global variables in included files, load variables to external movies. |
Determine the application's susceptibility to Flash injection
Determine the application's susceptibility to Flash injection. For each URL identified in the explore phase, the attacker attempts to use various techniques such as direct load asfunction, controlled evil page/host, Flash HTML injection, and DOM injection to determine whether the application is susceptible to Flash injection.
Technique |
---|
Test the page using direct load asfunction, getURL,javascript:gotRoot("")///d.jpg |
Test the page using controlled evil page/host, http://example.com/evil.swf |
Test the page using Flash HTML injection, "'>![]() |
Test the page using DOM injection, (gotRoot('')) |
Inject malicious content into target
Inject malicious content into target utilizing vulnerable injection vectors identified in the Experiment phase
Technique |
---|
The attacker needs to have knowledge of Flash, especially how to insert content the executes commands.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Confidentiality | N/A | Other | Information Leakage |
Integrity | N/A | Modify Data | N/A |
Confidentiality | N/A | Read Data | N/A |
Authorization | N/A | Execute Unauthorized Commands | Run Arbitrary Code |
AccountabilityAuthenticationAuthorizationNon-Repudiation | N/A | Gain Privileges | N/A |
Access ControlAuthorization | N/A | Bypass Protection Mechanism | N/A |
Taxonomy Name | Entry ID | Entry Name |
---|