Vulnerability identifier: #VU75352
Vulnerability risk: High
CVSSv3.1: 7.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-73
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Foxit PDF Reader for Windows
Client/Desktop applications /
Office applications
Foxit PDF Editor (formerly Foxit PhantomPDF)
Client/Desktop applications /
Office applications
Vendor: Foxit Software Inc.
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to improper handling of the cPath parameter in the exportXFAData method. A remote attacker can write an arbitrary file with .hta extension to the Startup folder and execute arbitrary code after a restart.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Foxit PDF Reader for Windows: 10.0.0.35798 - 12.1.1.15289
Foxit PDF Editor (formerly Foxit PhantomPDF): 12.0.0.0601 - 12.1.1.15289, 11.0.0.0510 - 11.2.5.53785, 10.0.0.35798 - 10.1.11.37866
External links
http://www.foxitsoftware.com/support/security-bulletins.html
http://www.zerodayinitiative.com/advisories/ZDI-23-491/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.