Foxit PhantomPDF CombineFiles Arbitrary File Write Remote Code Execution Vulnerability
2021-08-25 05:55:12 Author: blog.exodusintel.com(查看原文) 阅读量:49 收藏

EIP-2019-0006

The vulnerability exists within an RPC interface listening on TCP port 6000, exposed by Foxit PhantomPDF. The CombineFiles method of the Creator object does not properly validate the DestPDFFile argument, allowing arbitrary files to be written under the context of the user running PhantomPDF. An attacker can create a specially crafted PDF file that will abuse this vulnerability to achieve remote code execution.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-2019-0006
  • MITRE CVE: Pending

Vulnerability Metrics

  • CVSS Score: 7.5

Vendor References

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendors: February 24th, 2021
  • Disclosed to public: July 27th, 2021

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2021/08/24/foxit-phantompdf-combinefiles-arbitrary-file-write-remote-code-execution-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=foxit-phantompdf-combinefiles-arbitrary-file-write-remote-code-execution-vulnerability
如有侵权请联系:admin#unsafe.sh