Flash Injection |
Attack Pattern ID: 182 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Flash Injection |
Attack Pattern ID: 182 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attacker.
The target must be capable of running Flash applications.
In some cases, the target must follow an attacker-supplied link.
The attacker may need to be able to serve the injected Flash content, but otherwise no special resources are required.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 240 | Resource Injection | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 178 | Cross-Site Flashing | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.