Vulnerabilities

Adobe Patches Flaw in Analytics AppMeasurement for Flash Library

Adobe released an update on Thursday for the Analytics AppMeasurement for Flash library to address a DOM-based cross-site scripting (XSS) vulnerability rated “important.”

The AppMeasurement for Flash library allows users to collect video viewing activity and forward the data to Adobe’s data collection servers, where it can be used via Marketing Cloud services.

<p><strong><span><span>Adobe released an update on Thursday for the Analytics AppMeasurement for Flash library to address a DOM-based cross-site scripting (XSS) vulnerability rated “important.”</span></span></strong></p><p><span><span>The AppMeasurement for Flash library allows users to collect video viewing activity and forward the data to Adobe’s data collection servers, where it can be used via Marketing Cloud services.</span></span></p>

Adobe released an update on Thursday for the Analytics AppMeasurement for Flash library to address a DOM-based cross-site scripting (XSS) vulnerability rated “important.”

The AppMeasurement for Flash library allows users to collect video viewing activity and forward the data to Adobe’s data collection servers, where it can be used via Marketing Cloud services.

Security researcher Randy Westergren discovered that the library is plagued by a DOM-based XSS vulnerability (CVE-2016-1036) when the debugTracking feature is enabled. It’s worth noting that the feature is disabled in the default configuration.

The security hole affects AppMeasurement for Flash version 4.0 and earlier on all platforms, and it has been patched by Adobe with the release of version 4.0.1. The company has advised users to disable debugTracking immediately and rebuild their projects using the updated library.

“Due to security reasons, we will no longer be distributing an AS2 version of AppMeasurement for Flash. We will continue to support data collection from existing AS2-based projects. However, we highly recommend that customers upgrade their implementations to AS3 and incorporate the latest security features of AppMeasurement for Flash,” the company noted.

Adobe said it’s not aware of any instances where this vulnerability has been exploited for malicious purposes.

Over the past months, Westergren reported finding security bugs in products from Verizon, United Airlines, Marriott and several other companies. The expert said he will disclose the details of the Adobe AppMeasurement library vulnerability in a couple of weeks.

Adobe is moving away from QuickTime

Advertisement. Scroll to continue reading.

Trend Micro reported earlier this month that Apple ended support for QuickTime on Windows and will no longer release security updates. The security firm learned of the tech giant’s decision after a researcher found a couple of serious remote code execution vulnerabilities in QuickTime.

Security experts have advised users to remove QuickTime on Windows to protect their systems against potential attacks. However, Adobe informed customers that they should not rush to uninstall QuickTime if they rely on certain codecs.

Adobe has been working on developing native codecs for its video, audio and digital imaging applications, but there still are some media formats that can only be used if QuickTime is installed.

“Adobe’s desire has always been to support everything natively without the need for QuickTime. As a result of the above we intend to increase our efforts to remove these incompatibilities, and provide our customers with a complete native pipeline,” the company said.

Related: Adobe Patches Flash Zero-Day Exploited by Magnitude EK

Related: Adobe Patches Flaws in Creative Cloud, RoboHelp

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version