OS Command Injection in Foxit Software Inc. products - #VU89812

 

OS Command Injection in Foxit Software Inc. products - #VU89812

Published: May 24, 2024


Vulnerability identifier: #VU89812
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Foxit PDF Editor for Mac (formerly PhantomPDF)
Foxit PDF Reader for Mac
Software vendor:
Foxit Software Inc.

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when opening certain PDFs that include the Launch File action. A remote attacker can trick the victim to open a specially crafted PDF file and lick on the "OK" button to execute arbitrary commands on the system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links