#VU52955 Files or Directories Accessible to External Parties in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF)

 

#VU52955 Files or Directories Accessible to External Parties in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF)

Published: May 6, 2021


Vulnerability identifier: #VU52955
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-552
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Software vendor:
Foxit Software Inc.

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to the application fails to restrict the file type and validate the file path in extractPages and CombineFiles functions. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and overwrite arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.


Remediation

Install updates from vendor's website.

External links