Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-2461 PoC — Adobe Flex SDK跨站脚本漏洞

Source
Associated Vulnerability
Title:Adobe Flex SDK跨站脚本漏洞 (CVE-2011-2461)
Description:Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains.
Description
ParrotNG is a tool capable of identifying Adobe Flex  applications (SWF) vulnerable to CVE-2011-2461
Readme
# ParrotNG ![ParrotNG Logo](http://i.imgur.com/Ek8SGIit.png "ParrotNG Logo")

ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to [CVE-2011-2461](https://www.adobe.com/support/security/bulletins/apsb11-25.html). For more details, please refer to the slides of our [Troopers 2015 talk](http://www.slideshare.net/ikkisoft/the-old-is-new-again-cve20112461-is-back).

Download the latest release from [HERE](https://github.com/ikkisoft/ParrotNG/releases).

##Features

* Written in Java, based on [swfdump](http://www.swftools.org/swfdump.html)
* One JAR, two flavors: command line utility and [Burp Pro](http://portswigger.net/burp/editions.html) Passive Scanner plugin 
* Detection of SWF files compiled with either a vulnerable Flex SDK version, patched by [Adobe's tool](http://helpx.adobe.com/flash-builder/kb/flex-security-issue-apsb11-25.html) or not affected

##How To Use - Command Line

1. Download the latest ParrotNG from the release page
2. Simply use the following command:
```
$ java -jar parrotng_v0.2.jar <SWF File | Directory>
```
The tool accepts a single SWF file or an entire directory.

![ParrotNG CmdLine](http://i.imgur.com/1JT4CtH.png "ParrotNGCmdLine")

##How To Use - Burp Pro Passive Scanner Plugin

1. Download the latest ParrotNG from the release page
2. Load Burp Suite Professional
3. From the _Extender_ tab in Burp Suite,  add [parrotng_v0.2.jar](https://github.com/ikkisoft/ParrotNG/releases) as a standard Java-based Burp Extension
4. Enable [Burp Scanner Passive Scanning](http://portswigger.net/burp/help/scanner_scanmodes.html)
5. Browse your target web application. All SWF files passing through Burp Suite are automatically analyzed  

![ParrotNG Burp](http://i.imgur.com/thAkkMB.png "ParrotNGBurp")


File Snapshot

[4.0K] /data/pocs/e38a47eeafb838603969f523697b26bf6aa98f06 ├── [4.0K] documents │   ├── [ 34K] gpl.txt │   ├── [1.3K] readme.txt │   └── [1.7M] Troopers 2015 - The old is new, again. CVE-2011-2461 is back!.pdf ├── [ 34K] LICENSE ├── [1.7K] README.md └── [4.0K] src ├── [4.0K] burp │   └── [7.6K] BurpExtender.java └── [4.0K] org └── [4.0K] nibblesec └── [4.0K] tools └── [9.0K] ParrotNG.java 6 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →