Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability
2021-08-24 06:03:21 Author: blog.exodusintel.com(查看原文) 阅读量:28 收藏

EIP-2018-0045

The vulnerability exists within the JavaScript PDF API exposed by Foxit PhantomPDF. The loadHtmlView method of the app object invokes attacker-controlled JavaScript code in a privileged context. An attacker can create a specially crafted PDF file that will abuse this vulnerability to bypass the context based security mechanism of the JS PDF API.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-2018-0045
  • MITRE CVE: Pending

Vulnerability Metrics

  • CVSS Score: 6.8

Vendor References

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendors: February 24th, 2021
  • Disclosed to public: July 27th, 2021

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2021/08/23/foxit-phantompdf-loadhtmlview-context-level-bypass-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=foxit-phantompdf-loadhtmlview-context-level-bypass-vulnerability
如有侵权请联系:admin#unsafe.sh