---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Adobe Flex 3 History Management Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA30746 VERIFY ADVISORY: http://secunia.com/advisories/30746/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: Adobe Flex 3.x http://secunia.com/product/19093/ DESCRIPTION: A vulnerability has been reported in Adobe Flex 3, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input passed to historyFrame.html as used by Flex 3 History Management is not properly sanitised before being returned to a user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation requires that the web application developed with Flex 3 has History Management enabled. The vulnerability affects Flex 3.0.1 SDK and Flex Builder 3. SOLUTION: Update to version 3.0.2 SDK and apply the updated historyFrame.html file on currently deployed Flex 3 web applications (see vendor's advisory for more information). http://opensource.adobe.com/wiki/display/flexsdk/Download+Flex+3 http://www.adobe.com/support/security/bulletins/downloads/historyFrame.zip PROVIDED AND/OR DISCOVERED BY: The vendor credits Ory Segal, Adi Sharabani, and Ayal Yogev of IBM Rational Application Security. ORIGINAL ADVISORY: APSB08-14: http://www.adobe.com/support/security/bulletins/apsb08-14.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------