SlideShare a Scribd company logo
Top security threats to Flash/Flex applications and how to avoid them@EladElrom
@EladElromAssociate Dev Director @ Sigma Group
Senior Flash Engineer & Lead
Technical Writer
FlashAndTheCity Organizer
Adobe Community ProfessionalWhat you’ll gain out of this Preso?Gain knowledge about security in regards to Flash and Flex applications.See some examples of how an attacker can abuse Flash/Flex applicationsLearn ways to help prevent these attacks. increase awareness so you will take security into consideration when building your applications.
Flash Sandbox“The sandbox defines a limited space in which a Macromedia Flash movie running within the Macromedia Flash Player is allowed to operate. Its primary purpose is to ensure the integrity and security of the client’s machine, and as well as security of any Macromedia Flash movies running in the player."
introSlide from Deneb Meketa's security presentation at MAX
Decompiling and modifying swf file
DecompileThe concept of downloading Flash applications, decompiling, modifying them, and then re-compiling them is one of the oldest & most used cross-scripting techniques out there. Hackers’ use programs such as Sothink SWF decompiler software which allows them to modify the swf.
Decompile Flex AppsNot many developers are aware of the fact that these decompilers are now capable of decompiling Flex projects in addition to Flash applications. Let’s take a look at this simple example.
After the project is restored, you can then import the project back into Flash builder and change the project. Phishing attack is when a hacker tries to obtain user’s sensitive information by impersonating as a trustworthy entity.
Hacking a template siteAs a second example I went to one of these Flash template site and used a Web Proxy to extract the swf URL and download the swf file to my desktop, then decompiled and opened in Flash Professional
Export to FLA
View .fla
Loading the Flash app SWF file into another project
Hackers gain accessSlide from Deneb Meketa's security presentation at MAX
Change properties on runtimeLoading a swf file belonging to a Flex project and then having the accessing application make changes to the access application. In the example below the accessing application gains access to an application, and I was then able to change the text property on a label and even use a login service method. Create a new project.
Cross Domain PolicyAt this point we are loading the accessed application from the same domain; however, if you place the accessed application and the accessing application on two separate domains and place a domain policy that allows accessing the domain from any domain, as in this example below, it will work.
Allow cross domainwho can access?https used for Encryption, Authentication user, change dataAvoid: allowInsecureDomain("*");
Id request w/ Custom request headers - control what can be accessedAll - any portMaster Only - port 843none - no socket policy files allowed
Allow portsList of TCP and UDP port numbershttp://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
Attacker figure out application source code
Phishing for public methodsIn this example we have access to the source code; however, in case the attacker does not have access to the source code, they can find out the source code in two ways. Once the content is loaded we can actually place a break point and see all the methods we have access to, see figure below.
Decompile accessed appAdditionally, using decompiling software, the attacker can decompile the accessed application and browse through the classes
Accessing other domain through the accessed application
Similarly to the application I showed you previously, an attacker could load a SWF from a domain that has access to other domain and than make un-authorized service calls. For instance, let’s say that DomainA allow access to DomainB, as you can see from the Cross Domain policy below: Access SWF from another SWF
Security.allowDomain(“*”)Avoid global (wild card) permissions!
Load SWF and accessThe accessing application can load the SWF and access the service class to make an illegal call, and then it can retrieve the data. For instance, let’s assume that a site allows a certain authorized domain to make service calls but the API is not public. If the authorized domain holds a SWF that can be accessed, one can use that SWF to gain access to the API and make un-authorized service calls. this.content.document.service.send();
Code sample
How to avoid cross-scripting attacks
Solution #1Setting a restricted cross-domain policy that limits the domains that can access the application
Solution #2Use code obfuscation software such as secureSWF from Kindisoft (www.kindisoft.com/), which helps you to protect your ActionScript from Flash decompilers.
Solution #3Avoid using Security.allowDomain(“*”) method to permit access to all swfs.  Set the ones you allow access.
Cross-site scripting (XSS) vulnerability
What is XSS?The idea is to involve more than one site, and that’s where the name (Cross-site) came from, a second site injects a script and can do anything it wants with the page.Examples?
Account theftAccount theft - Attackers can grab cookie information, which can lead to account hijacking since many cookies holds account information.
Change page contentChanging content on a page - Misleading user to re-enter their information on a phony site, place incorrect content or read user’s cookies.
Vulnerability in Flex applicationsFlash Player is not vulnerable to cross scripting directly since the byte-code get compiled through the Virtual Machine (VM), However Flash is often used on a page that includes other scripts and your application may interact with other Web pages elements and that can open a security hole since Web page that generate content dynamically without filtering the results first. Attackers can exploit your application and create XSS.
Inbound/outboundSlide from Deneb Meketa's security presentation at MAX
Cross-Scripting attack to a WebPage from Flex
Simple application example
Hackers can redirect<script>alert('Test')</script><script type="text/javascript">window.location = "http://www.google.com/"</script>
Malicious data injection
What’s Malicious data injection?In cases where a Web Page have permissions to reading and writing from and to a Web Page an attacker can abuse these and rewrite the a web page or redirect users from the Web Page to a phishing site, this type of a attack is know as malicious data injection attack or Script injection.
Flash malicious data injection attackThe attacker can inject data and create a cross-site scripting (XSS) attack. Coding in ActionScript and using APIs such as ExternalInterface, navigateToURL or getURL. The attacker can than redirect the URL and even post a JavaScript code, which would capture the user’s cookies with personal information.
ExampleLet’s say we need a script to retrieve a parameter that was passed through the URL into the Flex application. As you know you can pass variables using FlashVar and than use the following syntax in Flex 4 To read the parameter:FlexGlobals.topLevelApplication.parameters.nameHowever in case you want to pass the parameters through the URL you need to call the SWF directly like so:MyApp.swf?name=EladMy code allows me to read the parameter from the URL without calling the SWF directly.
How it works?Here is how it works. I am registering a callback Javascript function called getParams and once the user click on a button I am calling the Javascript method getURLString, which retrieve the URL parameter and pass it back to the callback.
Example application
Hacker abuse loophole?name=Elad I pass the following parameter: ?name=%3Cscript%3Ealert('Elad')%3C/script%3E
Cross-site scripting through navigation URLs
Attacking browser exampleAttacking browser navigation URLs is a popular attack. Similar to the example I showed you at "Malicious data injection" section, attackers can inject data through URL. In addition to passing data through FlashVars it's common to use deep linking to change the application state. The application takes params through the URL and than create a link on the application.
Top security threats to Flash/Flex applications and how to avoid them
History Management vulnerability in Flex 3
Flex 3 History managementThe same type of cross-site scripting we just showed you were found in the History Management handled by historyFrame.html in Flex 3. The vulnerability occurs in code used by the History Management feature. In case you use Flex 3 and use the History management features you need to upgrade to at least Flex 3.0.2 SDK Update or just replace the HTML files from Flex 3.02.
How to avoid Cross-Scripting attack
Whitelisting & BlacklistingThe way to avoid must of cross-scripting attacks is to sufficiently sanitize user-supplied data, what it mean is that it’s a good practice to apply the same best practices as old-fashioned web application and to filter the data that user enters to insure that the user entered a proper format and contains only expected data.To avoid this type of vulnerability you can add a code to your Flex/Flash application that will stripe HTML tags, tag attributes, values, Javascript, CSS, HTML and URL.You can take the whitelist or blacklist approach in regards to validating the data. Whitelist is preferred, however whitelisting isn’t always possible so blacklisting can be used.
allowScriptAccess
allowScriptAccess optionsSlide from Deneb Meketa's security presentation at MAX
Set allowScriptAccess correctlySlide from Deneb Meketa's security presentation at MAX
Find HTML tags
Use RegExp to avoid attacks I am using the RegExpValidator component and pass the RegExp "((\%3C)|<). In case there is no match you’ll get: “field is invalid”.You can insert all the RegExp and see if you get zero results, which means that the expression was present.To read more see Symantec article: http://www.symantec.com/connect/articles/detection-sql-injection-and-cross-site-scripting-attacks
Update Flash Player and SDK often Updating Flash Player and SDK. Adobe is constantly working to fight attackers. For instance during the upgrade to Flex SDK 3.4 Adobe have solved an issues regarding ticket CVE-2009-1879, which took care of Cross-site scripting (XSS) vulnerability in the index.template.html in SDK 3.3. When the installed Flash version was older than a specified requiredMajorVersion value it allowed the remote attackers to inject arbitrary web script or HTML via the query string.
Common security on local builts:Flash Access The Internet

More Related Content

PDF
Linkedin.com DomXss 04-08-2014
PPT
PPT
Hacking web applications
PPT
Application Security
PPT
Ch10 Hacking Web Servers http://ouo.io/2Bt7X
PPTX
SQL Injection and Clickjacking Attack in Web security
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PPTX
MITM Attacks on HTTPS: Another Perspective
Linkedin.com DomXss 04-08-2014
Hacking web applications
Application Security
Ch10 Hacking Web Servers http://ouo.io/2Bt7X
SQL Injection and Clickjacking Attack in Web security
Website hacking and prevention (All Tools,Topics & Technique )
MITM Attacks on HTTPS: Another Perspective

What's hot (20)

ODP
Top 10 Web Security Vulnerabilities
PPTX
Web application attacks
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Owasp Top 10 A1: Injection
PDF
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
PPT
Top Ten Web Hacking Techniques – 2008
PDF
Testing REST Web Services
PDF
New Insights into Clickjacking
PPTX
OWASP top 10-2013
DOCX
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
PPTX
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
PPT
Web Application Security
PDF
Brief introduction into SQL injection attack scenarios
PPT
Hacking A Web Site And Secure Web Server Techniques Used
PDF
Web Application Firewall: Suckseed or Succeed
PDF
iOS Masque Attack
PPT
Web Application Security: The Land that Information Security Forgot
PDF
Input validation slides of web application workshop
PDF
Session10-PHP Misconfiguration
PDF
Rich Web App Security - Keeping your application safe
Top 10 Web Security Vulnerabilities
Web application attacks
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Owasp Top 10 A1: Injection
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Top Ten Web Hacking Techniques – 2008
Testing REST Web Services
New Insights into Clickjacking
OWASP top 10-2013
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
Web Application Security
Brief introduction into SQL injection attack scenarios
Hacking A Web Site And Secure Web Server Techniques Used
Web Application Firewall: Suckseed or Succeed
iOS Masque Attack
Web Application Security: The Land that Information Security Forgot
Input validation slides of web application workshop
Session10-PHP Misconfiguration
Rich Web App Security - Keeping your application safe
Ad

Similar to Top security threats to Flash/Flex applications and how to avoid them (20)

PDF
FIRM: Capability-based Inline Mediation of Flash Behaviors
 
PPTX
08- pen-testing Web applications attacks.pptx
PDF
Dom Hackking & Security - BlackHat Preso
PPT
Flex security
PDF
React security vulnerabilities
PPTX
Browser Security ppt.pptx
PPT
Cyber security
PPTX
Click jacking
PPTX
.NET Security Topics
PPTX
Chapter 5: Attack Execution - The Client
PDF
Top 10 HTML5 Threats - Whitepaper
PDF
Attack with-html5
PPTX
Tips for web security
PPTX
Tips for web security
DOCX
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
PPTX
Secure programming with php
PPTX
W3 conf hill-html5-security-realities
PDF
Blackhat11 shreeraj reverse_engineering_browser
PPTX
Html5 offers 5 times better ways to hijack the website
DOC
HallTumserFinalPaper
FIRM: Capability-based Inline Mediation of Flash Behaviors
 
08- pen-testing Web applications attacks.pptx
Dom Hackking & Security - BlackHat Preso
Flex security
React security vulnerabilities
Browser Security ppt.pptx
Cyber security
Click jacking
.NET Security Topics
Chapter 5: Attack Execution - The Client
Top 10 HTML5 Threats - Whitepaper
Attack with-html5
Tips for web security
Tips for web security
Cross-site scripting (XSS) AttacksCross-site scripting (XSS) i.docx
Secure programming with php
W3 conf hill-html5-security-realities
Blackhat11 shreeraj reverse_engineering_browser
Html5 offers 5 times better ways to hijack the website
HallTumserFinalPaper
Ad

More from Elad Elrom (7)

PPTX
20 x Tips to better Optimize your Flash content
PPTX
Developing & Deploying AIR Applications for TV
PDF
Essential Eclipse Plug-ins and Tools for Flash Builder Developers
PPT
Flex data binding pitfalls: 10 common misuses and mistakes
PPTX
Test Driven Development (TDD) with FlexUnit 4 - 360|Flex San Jose preso
PPT
Getting Started with Adobe AIR 1.5
PPT
Mashups MAX 360|MAX 2008 Unconference
20 x Tips to better Optimize your Flash content
Developing & Deploying AIR Applications for TV
Essential Eclipse Plug-ins and Tools for Flash Builder Developers
Flex data binding pitfalls: 10 common misuses and mistakes
Test Driven Development (TDD) with FlexUnit 4 - 360|Flex San Jose preso
Getting Started with Adobe AIR 1.5
Mashups MAX 360|MAX 2008 Unconference

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
1. Introduction to Computer Programming.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TLE Review Electricity (Electricity).pptx
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
OMC Textile Division Presentation 2021.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
Heart disease approach using modified random forest and particle swarm optimi...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Univ-Connecticut-ChatGPT-Presentaion.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
1. Introduction to Computer Programming.pptx
A comparative analysis of optical character recognition models for extracting...
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TLE Review Electricity (Electricity).pptx

Top security threats to Flash/Flex applications and how to avoid them

  • 1. Top security threats to Flash/Flex applications and how to avoid them@EladElrom
  • 6. Adobe Community ProfessionalWhat you’ll gain out of this Preso?Gain knowledge about security in regards to Flash and Flex applications.See some examples of how an attacker can abuse Flash/Flex applicationsLearn ways to help prevent these attacks. increase awareness so you will take security into consideration when building your applications.
  • 7. Flash Sandbox“The sandbox defines a limited space in which a Macromedia Flash movie running within the Macromedia Flash Player is allowed to operate. Its primary purpose is to ensure the integrity and security of the client’s machine, and as well as security of any Macromedia Flash movies running in the player."
  • 8. introSlide from Deneb Meketa's security presentation at MAX
  • 10. DecompileThe concept of downloading Flash applications, decompiling, modifying them, and then re-compiling them is one of the oldest & most used cross-scripting techniques out there. Hackers’ use programs such as Sothink SWF decompiler software which allows them to modify the swf.
  • 11. Decompile Flex AppsNot many developers are aware of the fact that these decompilers are now capable of decompiling Flex projects in addition to Flash applications. Let’s take a look at this simple example.
  • 12. After the project is restored, you can then import the project back into Flash builder and change the project. Phishing attack is when a hacker tries to obtain user’s sensitive information by impersonating as a trustworthy entity.
  • 13. Hacking a template siteAs a second example I went to one of these Flash template site and used a Web Proxy to extract the swf URL and download the swf file to my desktop, then decompiled and opened in Flash Professional
  • 16. Loading the Flash app SWF file into another project
  • 17. Hackers gain accessSlide from Deneb Meketa's security presentation at MAX
  • 18. Change properties on runtimeLoading a swf file belonging to a Flex project and then having the accessing application make changes to the access application. In the example below the accessing application gains access to an application, and I was then able to change the text property on a label and even use a login service method. Create a new project.
  • 19. Cross Domain PolicyAt this point we are loading the accessed application from the same domain; however, if you place the accessed application and the accessing application on two separate domains and place a domain policy that allows accessing the domain from any domain, as in this example below, it will work.
  • 20. Allow cross domainwho can access?https used for Encryption, Authentication user, change dataAvoid: allowInsecureDomain("*");
  • 21. Id request w/ Custom request headers - control what can be accessedAll - any portMaster Only - port 843none - no socket policy files allowed
  • 22. Allow portsList of TCP and UDP port numbershttp://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
  • 23. Attacker figure out application source code
  • 24. Phishing for public methodsIn this example we have access to the source code; however, in case the attacker does not have access to the source code, they can find out the source code in two ways. Once the content is loaded we can actually place a break point and see all the methods we have access to, see figure below.
  • 25. Decompile accessed appAdditionally, using decompiling software, the attacker can decompile the accessed application and browse through the classes
  • 26. Accessing other domain through the accessed application
  • 27. Similarly to the application I showed you previously, an attacker could load a SWF from a domain that has access to other domain and than make un-authorized service calls. For instance, let’s say that DomainA allow access to DomainB, as you can see from the Cross Domain policy below: Access SWF from another SWF
  • 29. Load SWF and accessThe accessing application can load the SWF and access the service class to make an illegal call, and then it can retrieve the data. For instance, let’s assume that a site allows a certain authorized domain to make service calls but the API is not public. If the authorized domain holds a SWF that can be accessed, one can use that SWF to gain access to the API and make un-authorized service calls. this.content.document.service.send();
  • 31. How to avoid cross-scripting attacks
  • 32. Solution #1Setting a restricted cross-domain policy that limits the domains that can access the application
  • 33. Solution #2Use code obfuscation software such as secureSWF from Kindisoft (www.kindisoft.com/), which helps you to protect your ActionScript from Flash decompilers.
  • 34. Solution #3Avoid using Security.allowDomain(“*”) method to permit access to all swfs. Set the ones you allow access.
  • 36. What is XSS?The idea is to involve more than one site, and that’s where the name (Cross-site) came from, a second site injects a script and can do anything it wants with the page.Examples?
  • 37. Account theftAccount theft - Attackers can grab cookie information, which can lead to account hijacking since many cookies holds account information.
  • 38. Change page contentChanging content on a page - Misleading user to re-enter their information on a phony site, place incorrect content or read user’s cookies.
  • 39. Vulnerability in Flex applicationsFlash Player is not vulnerable to cross scripting directly since the byte-code get compiled through the Virtual Machine (VM), However Flash is often used on a page that includes other scripts and your application may interact with other Web pages elements and that can open a security hole since Web page that generate content dynamically without filtering the results first. Attackers can exploit your application and create XSS.
  • 40. Inbound/outboundSlide from Deneb Meketa's security presentation at MAX
  • 41. Cross-Scripting attack to a WebPage from Flex
  • 43. Hackers can redirect<script>alert('Test')</script><script type="text/javascript">window.location = "http://www.google.com/"</script>
  • 45. What’s Malicious data injection?In cases where a Web Page have permissions to reading and writing from and to a Web Page an attacker can abuse these and rewrite the a web page or redirect users from the Web Page to a phishing site, this type of a attack is know as malicious data injection attack or Script injection.
  • 46. Flash malicious data injection attackThe attacker can inject data and create a cross-site scripting (XSS) attack. Coding in ActionScript and using APIs such as ExternalInterface, navigateToURL or getURL. The attacker can than redirect the URL and even post a JavaScript code, which would capture the user’s cookies with personal information.
  • 47. ExampleLet’s say we need a script to retrieve a parameter that was passed through the URL into the Flex application. As you know you can pass variables using FlashVar and than use the following syntax in Flex 4 To read the parameter:FlexGlobals.topLevelApplication.parameters.nameHowever in case you want to pass the parameters through the URL you need to call the SWF directly like so:MyApp.swf?name=EladMy code allows me to read the parameter from the URL without calling the SWF directly.
  • 48. How it works?Here is how it works. I am registering a callback Javascript function called getParams and once the user click on a button I am calling the Javascript method getURLString, which retrieve the URL parameter and pass it back to the callback.
  • 50. Hacker abuse loophole?name=Elad I pass the following parameter: ?name=%3Cscript%3Ealert('Elad')%3C/script%3E
  • 52. Attacking browser exampleAttacking browser navigation URLs is a popular attack. Similar to the example I showed you at "Malicious data injection" section, attackers can inject data through URL. In addition to passing data through FlashVars it's common to use deep linking to change the application state. The application takes params through the URL and than create a link on the application.
  • 55. Flex 3 History managementThe same type of cross-site scripting we just showed you were found in the History Management handled by historyFrame.html in Flex 3. The vulnerability occurs in code used by the History Management feature. In case you use Flex 3 and use the History management features you need to upgrade to at least Flex 3.0.2 SDK Update or just replace the HTML files from Flex 3.02.
  • 56. How to avoid Cross-Scripting attack
  • 57. Whitelisting & BlacklistingThe way to avoid must of cross-scripting attacks is to sufficiently sanitize user-supplied data, what it mean is that it’s a good practice to apply the same best practices as old-fashioned web application and to filter the data that user enters to insure that the user entered a proper format and contains only expected data.To avoid this type of vulnerability you can add a code to your Flex/Flash application that will stripe HTML tags, tag attributes, values, Javascript, CSS, HTML and URL.You can take the whitelist or blacklist approach in regards to validating the data. Whitelist is preferred, however whitelisting isn’t always possible so blacklisting can be used.
  • 59. allowScriptAccess optionsSlide from Deneb Meketa's security presentation at MAX
  • 60. Set allowScriptAccess correctlySlide from Deneb Meketa's security presentation at MAX
  • 62. Use RegExp to avoid attacks I am using the RegExpValidator component and pass the RegExp "((\%3C)|<). In case there is no match you’ll get: “field is invalid”.You can insert all the RegExp and see if you get zero results, which means that the expression was present.To read more see Symantec article: http://www.symantec.com/connect/articles/detection-sql-injection-and-cross-site-scripting-attacks
  • 63. Update Flash Player and SDK often Updating Flash Player and SDK. Adobe is constantly working to fight attackers. For instance during the upgrade to Flex SDK 3.4 Adobe have solved an issues regarding ticket CVE-2009-1879, which took care of Cross-site scripting (XSS) vulnerability in the index.template.html in SDK 3.3. When the installed Flash version was older than a specified requiredMajorVersion value it allowed the remote attackers to inject arbitrary web script or HTML via the query string.
  • 64. Common security on local builts:Flash Access The Internet
  • 65. swf trying to access the internetSecurityError: Error #2028: Local-with-filesystem SWF file file:///file.swf cannot access Internet URL http://...
  • 66. Solutionhttp://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager04.htmlAdd "trusted" locations6 - Click on Edit Locations7 - Click on Add Location8 - Click on Browse for folder9 - Select the folder were your flash app is
  • 67. Links:Elad Elrom’s articleshttp://www.insideria.com/2009/12/top-security-threats-to-flashf.htmlhttp://insideria.com/2010/06/top-security-threats-to-flashf-1.htmlThe Flash Player Security Topic Center:http://www.adobe.com/devnet/securityOWASPhttp://www.owasp.org/index.php/Category:OWASP_Flash_Security_ProjectQ&A