漏洞问题 - Security.allowDomain(*) - Flow 播放器

发布于 2024-12-18 12:14:37 字数 948 浏览 2 评论 0原文

我们在网站上使用 Flow 播放器控件来观看视频。我们可以正常观看视频了。 但当我们运行网站安全漏洞测试时,检测到了可能的威胁。

线程 -- Security.allowDomain("*") 在 Flash 影片中使用 http://abc.com/JScripts/flowplayer-3.1.5.swf

Flow Player 版本是 3.1.5

谁能告诉我需要采取什么措施来处理这种安全威胁? 下面是代码

<script type="text/javascript" language="JavaScript">
    flowplayer("player", "../JScripts/flowplayer-3.1.5.swf", {
        clip: {url: '<%= getVideoUrl() %>', autoPlay: false,autoBuffering: true},
        plugins:
            {
                controls:
                {
                    url: '../JScripts/flowplayer.controls-3.1.5.swf',
                    all: false, play: true, stop: true, scrubber: true,volume: true,
                    mute: true, time: true, tooltips: {buttons: true, fullscreen: 'Enter fullscreen mode'}
                }
            }
        }); 
</script>

We are using a Flow player control on website to view video's. We are able to view the video properly.
But when we ran a Website Security Vulnerability Test , a possible threat was detected.

Thread -- Security.allowDomain("*") is used in a Flash movie
http://abc.com/JScripts/flowplayer-3.1.5.swf

The flow player version is 3.1.5

Can anyone tell what needs to be done to handle this security threat?
Below is the code

<script type="text/javascript" language="JavaScript">
    flowplayer("player", "../JScripts/flowplayer-3.1.5.swf", {
        clip: {url: '<%= getVideoUrl() %>', autoPlay: false,autoBuffering: true},
        plugins:
            {
                controls:
                {
                    url: '../JScripts/flowplayer.controls-3.1.5.swf',
                    all: false, play: true, stop: true, scrubber: true,volume: true,
                    mute: true, time: true, tooltips: {buttons: true, fullscreen: 'Enter fullscreen mode'}
                }
            }
        }); 
</script>

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

私藏温柔 2024-12-25 12:14:37

这只是说您允许所有域运行您的脚本并正确使用它们,比如有人想要从另一个站点运行您的 swf 脚本。 “*”部分表示每个域都可以这样做。漏洞评估表明这是一个问题,因为所有域都可以访问 swf 文件中的变量和对象,但是通过自动漏洞评估,您通常会收到很多误报。如果您仍然担心,请查看文档 http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/system/Security.html

That is just saying that you are allowing all domains to run your script and to use them properly, say someone wants to run your swf script from another site. "*" part means every domain is allowed to do that. the vulnerability assessment says this is an issue because all domains have access to your variables and objects in your swf file, however with automatic vulnerability assessments you typically get a lot of false positives. If you are still concerned take a look at the docs at http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/system/Security.html

放肆 2024-12-25 12:14:37

这是一个很大的问题。在许多情况下,这意味着攻击者可以:

  1. 在任何域上托管攻击者 SWF
  2. 将您的 SWF 加载到他的
  3. 攻击者中 让用户加载历史 SWF(例如,在不可见框架中)
  4. 通过附加所有环境用户凭据(cookie 或 HTTP 身份验证)对您的域执行 HTTP 请求您的易受攻击的 SWF

假设您有 http://www.abc.com/mail ,可以使用 cookie 或HTTP 验证。攻击者也许能够加载所有数据并将其发送到他的服务器。

  • 解决方案 1:删除所有 allowedDomain() 调用
  • 解决方案 2:仅允许
    受信任或受控制,攻击者无法将 SWF 上传到
  • 解决方案 3:
    在不使用环境的其他服务器上托管易受攻击的 SWF
    证书

This is a huge issue. In many cases it means that attacker can:

  1. Host attacker SWF on any domain
  2. Load your SWF into his
  3. Make user load hist SWF (e.g. in invisible frame)
  4. Execute HTTP requests to your domain with all ambient user credentials attached (cookies or HTTP Authentication) via your vulnerable SWF

Imagine you have http://www.abc.com/mail that is accessible using cookie or HTTP Auth. Attacker may be able to load all that data and send it to his server.

  • Solution 1: remove all allowDomain() calls
  • Solution 2: allow only
    trusted or controlled that attacker can't upload SWF to
  • Solution 3:
    host vulnerable SWF on other server that doesn't use ambient
    credentials
~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文