CVE-2014-4671
Description
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
hapinpm | < 6.1.0 | 6.1.0 |
Affected products
39cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*+ 32 more
- cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=11.2.202.378
- cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*
cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*range: <=14.0.0.110
- cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*
cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*range: <=14.0.0.110
- cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*
Patches
1d47f57abf23bMerge pull request #1766 from patrickkettner/rosetta-flash
2 files changed · +4 −4
lib/response/payload.js+1 −1 modified@@ -53,7 +53,7 @@ internals.Payload.prototype.size = function () { internals.Payload.prototype.jsonp = function (variable) { this._sizeOffset += variable.length + 3; - this._prefix = variable + '('; + this._prefix = '/**/' + variable + '('; this._data = Buffer.isBuffer(this._data) ? this._data : this._data.replace(/\u2028/g, '\\u2028').replace(/\u2029/g, '\\u2029'); this._suffix = ');'; };
test/response.js+3 −3 modified@@ -1047,7 +1047,7 @@ describe('Response', function () { server.inject('/?callback=me', function (res) { - expect(res.payload).to.equal('me({"some":"value"});'); + expect(res.payload).to.equal('/**/me({"some":"value"});'); expect(res.headers['content-length']).to.equal(21); done(); }); @@ -1096,7 +1096,7 @@ describe('Response', function () { Zlib.unzip(new Buffer(res.payload, 'binary'), function (err, result) { expect(err).to.not.exist; - expect(result.toString()).to.equal('docall({"first":"1","last":"2"});'); + expect(result.toString()).to.equal('/**/docall({"first":"1","last":"2"});'); done(); }); }); @@ -1114,7 +1114,7 @@ describe('Response', function () { server.inject('/?callback=me', function (res) { - expect(res.payload).to.equal('me(value);'); + expect(res.payload).to.equal('/**/me(value);'); expect(res.headers['content-length']).to.equal(10); done(); });
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
14- miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/nvdExploit
- helpx.adobe.com/security/products/flash-player/apsb14-17.htmlnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-363h-vj6q-3cmjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-4671ghsaADVISORY
- miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flashghsaWEB
- rhn.redhat.com/errata/RHSA-2014-0860.htmlnvdWEB
- secunia.com/advisories/59774nvdWEB
- secunia.com/advisories/59837nvdWEB
- security.gentoo.org/glsa/glsa-201407-02.xmlnvdWEB
- www.securityfocus.com/bid/68457nvdWEB
- www.securitytracker.com/id/1030533nvdWEB
- github.com/hapijs/hapi/commit/d47f57abf23bdaa84f61aed2bac94ae5f358afb7ghsaWEB
- github.com/spumko/hapi/pull/1766ghsaWEB
- www.npmjs.com/advisories/12ghsaWEB
News mentions
0No linked articles in our index yet.