Kingdom: API Abuse

An API is a contract between a caller and a callee. The most common forms of API abuse are caused by the caller failing to honor its end of this contract. For example, if a program fails to call chdir() after calling chroot(), it violates the contract that specifies how to change the active root directory in a secure fashion. Another good example of library abuse is expecting the callee to return trustworthy DNS information to the caller. In this case, the caller abuses the callee API by making certain assumptions about its behavior (that the return value can be used for authentication purposes). One can also violate the caller-callee contract from the other side. For example, if a coder subclasses SecureRandom and returns a non-random value, the contract is violated.

Often Misused: Flash Storage Object

Abstract
Unsafe use of Flash storage objects might lead to unauthorized client-side access to sensitive content.
Explanation
Local Storage Objects (LSO) are a mechanism provided by the Flash platform to persistently store data on the client machine. By default, the Flash security model restricts access to a shared object based on the domain hosting the SWF file that created it, the path of the SWF file, and whether the creating SWF file was hosted on HTTP or HTTPS. The localpath property on a shared object specifies the path of the SWFs that have access to a shared object. For example, a shared object created by http://www.example.com/dir1/dir2/sample.swf can be configured to be accessible by any SWF at http://www.example.com/dir1 by setting its localPath property to http://www.example.com/dir1.
Setting the localPath value to "/", gives all SWF files on that domain access to the shared object. On a domain hosting SWF applications from multiple parties, such a setting might lead to unauthorized data access.

If an application uses "/" to set the localPath inside a SharedObject.getLocal() call, the shared object is configured to be accessible by all SWFs on the domain, which exposes the application to information theft risks.
References
[1] Standards Mapping - DISA Control Correlation Identifier Version 2 CCI-001090
[2] Standards Mapping - FIPS200 MP
[3] Standards Mapping - General Data Protection Regulation (GDPR) Access Violation
[4] Standards Mapping - NIST Special Publication 800-53 Revision 4 SC-4 Information in Shared Resources (P1)
[5] Standards Mapping - NIST Special Publication 800-53 Revision 5 SC-4 Information in Shared System Resources
[6] Standards Mapping - OWASP Mobile 2024 M9 Insecure Data Storage
[7] Standards Mapping - OWASP Top 10 2004 A8 Insecure Storage
[8] Standards Mapping - OWASP Top 10 2010 A7 Insecure Cryptographic Storage
[9] Standards Mapping - OWASP Top 10 2013 A6 Sensitive Data Exposure
[10] Standards Mapping - OWASP Top 10 2017 A3 Sensitive Data Exposure
[11] Standards Mapping - OWASP Top 10 2021 A01 Broken Access Control
[12] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1 Requirement 6.5.8
[13] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2 Requirement 6.5.8
[14] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0 Requirement 6.5.3
[15] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0 Requirement 6.5.3
[16] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1 Requirement 6.5.3
[17] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2 Requirement 6.5.3
[18] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2.1 Requirement 6.5.3
[19] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0 Requirement 6.2.4
[20] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0.1 Requirement 6.2.4
[21] Standards Mapping - Payment Card Industry Software Security Framework 1.0 Control Objective 6.1 - Sensitive Data Protection
[22] Standards Mapping - Payment Card Industry Software Security Framework 1.1 Control Objective 6.1 - Sensitive Data Protection
[23] Standards Mapping - Payment Card Industry Software Security Framework 1.2 Control Objective 6.1 - Sensitive Data Protection
[24] Standards Mapping - Security Technical Implementation Guide Version 4.2 APSC-DV-002380 CAT II
[25] Standards Mapping - Security Technical Implementation Guide Version 4.3 APSC-DV-002380 CAT II
[26] Standards Mapping - Security Technical Implementation Guide Version 4.4 APSC-DV-002380 CAT II
[27] Standards Mapping - Security Technical Implementation Guide Version 4.5 APSC-DV-002380 CAT II
[28] Standards Mapping - Security Technical Implementation Guide Version 4.6 APSC-DV-002380 CAT II
[29] Standards Mapping - Security Technical Implementation Guide Version 4.7 APSC-DV-002380 CAT II
[30] Standards Mapping - Security Technical Implementation Guide Version 4.8 APSC-DV-002380 CAT II
[31] Standards Mapping - Security Technical Implementation Guide Version 4.9 APSC-DV-002380 CAT II
[32] Standards Mapping - Security Technical Implementation Guide Version 4.10 APSC-DV-002380 CAT II
[33] Standards Mapping - Security Technical Implementation Guide Version 4.11 APSC-DV-002380 CAT II
[34] Standards Mapping - Security Technical Implementation Guide Version 4.1 APSC-DV-002380 CAT II
[35] Standards Mapping - Security Technical Implementation Guide Version 5.1 APSC-DV-002380 CAT II
[36] Standards Mapping - Security Technical Implementation Guide Version 5.2 APSC-DV-002380 CAT II
[37] Standards Mapping - Security Technical Implementation Guide Version 5.3 APSC-DV-002380 CAT II
[38] Standards Mapping - Security Technical Implementation Guide Version 6.1 APSC-DV-002380 CAT II
[39] Standards Mapping - Web Application Security Consortium Version 2.00 Information Leakage (WASC-13)
[40] Standards Mapping - Web Application Security Consortium 24 + 2 Information Leakage
desc.dynamic.actionscript.often_misused_flash_storage_object