Rosetta is used in creating a new type of flash file. Usual flash files contain non-printable characters. Whereas, Rosetta can printable characters. When a web application request data from another web application, the server sends the data as JSONP (JavaScript Object Notation with Padding) to the receiving server. The attacker can make a malicious site request a JSONP file to victim web application. The JSONP file is used to communicate between different applications because the receiving server cannot make changes to the sender’s JSONP file. But, if the receiving file is a rosetta flash file, the flash file will be executed by the web browser. The attacker will leverage this bug to exploit the application.
The major impact includes leakage of sensitive data. An attacker can leak sensitive information like user credentials and other information about the end users
Beagle recommends the following fixes:-