VYPR
Moderate severityNVD Advisory· Published Jul 9, 2014· Updated May 6, 2026

CVE-2014-4671

CVE-2014-4671

Description

Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
hapinpm
< 6.1.06.1.0

Affected products

39
  • cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*+ 32 more
    • cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=11.2.202.378
    • cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*
  • Adobe Inc./Air3 versions
    cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*range: <=14.0.0.110
    • cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*range: <=14.0.0.110
    • cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*

Patches

1
d47f57abf23b

Merge pull request #1766 from patrickkettner/rosetta-flash

https://github.com/hapijs/hapiEran HammerJul 14, 2014via ghsa
2 files changed · +4 4
  • lib/response/payload.js+1 1 modified
    @@ -53,7 +53,7 @@ internals.Payload.prototype.size = function () {
     internals.Payload.prototype.jsonp = function (variable) {
     
         this._sizeOffset += variable.length + 3;
    -    this._prefix = variable + '(';
    +    this._prefix = '/**/' + variable + '(';
         this._data = Buffer.isBuffer(this._data) ? this._data : this._data.replace(/\u2028/g, '\\u2028').replace(/\u2029/g, '\\u2029');
         this._suffix = ');';
     };
    
  • test/response.js+3 3 modified
    @@ -1047,7 +1047,7 @@ describe('Response', function () {
     
                 server.inject('/?callback=me', function (res) {
     
    -                expect(res.payload).to.equal('me({"some":"value"});');
    +                expect(res.payload).to.equal('/**/me({"some":"value"});');
                     expect(res.headers['content-length']).to.equal(21);
                     done();
                 });
    @@ -1096,7 +1096,7 @@ describe('Response', function () {
                     Zlib.unzip(new Buffer(res.payload, 'binary'), function (err, result) {
     
                         expect(err).to.not.exist;
    -                    expect(result.toString()).to.equal('docall({"first":"1","last":"2"});');
    +                    expect(result.toString()).to.equal('/**/docall({"first":"1","last":"2"});');
                         done();
                     });
                 });
    @@ -1114,7 +1114,7 @@ describe('Response', function () {
     
                 server.inject('/?callback=me', function (res) {
     
    -                expect(res.payload).to.equal('me(value);');
    +                expect(res.payload).to.equal('/**/me(value);');
                     expect(res.headers['content-length']).to.equal(10);
                     done();
                 });
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

14

News mentions

0

No linked articles in our index yet.