Improper input validation in Foxit PDF Reader for Windows - CVE-2017-10952
Published: August 18, 2017 / Updated: August 12, 2020
Vulnerability identifier: #VU7988
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-10952
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Foxit Software Inc.
Affected software:
Foxit PDF Reader for Windows
Foxit PDF Reader for Windows
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in the saveAs JavaScript function due to insufficient validation of user-supplied input. A remote attacker can create a specially crafted .pdf file, trick the victim into opening it, write arbitrary files into attacker controlled locations and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise however requires that attacker is able to bypass Safe Reading Mode.
The weakness exists in the saveAs JavaScript function due to insufficient validation of user-supplied input. A remote attacker can create a specially crafted .pdf file, trick the victim into opening it, write arbitrary files into attacker controlled locations and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise however requires that attacker is able to bypass Safe Reading Mode.
How to mitigate CVE-2017-10952
Install update from vendor's website.