#VU75352 External Control of File Name or Path in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF)


Published: 2023-05-12 | Updated: 2023-06-17

Vulnerability identifier: #VU75352

Vulnerability risk: High

CVSSv3.1: 7.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-27363

CWE-ID: CWE-73

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Foxit PDF Reader for Windows
Client/Desktop applications / Office applications
Foxit PDF Editor (formerly Foxit PhantomPDF)
Client/Desktop applications / Office applications

Vendor: Foxit Software Inc.

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper handling of the cPath parameter in the exportXFAData method. A remote attacker can write an arbitrary file with .hta extension to the Startup folder and execute arbitrary code after a restart.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 10.0.0.35798 - 12.1.1.15289

Foxit PDF Editor (formerly Foxit PhantomPDF): 12.0.0.0601 - 12.1.1.15289, 11.0.0.0510 - 11.2.5.53785, 10.0.0.35798 - 10.1.11.37866


External links
http://www.foxitsoftware.com/support/security-bulletins.html
http://www.zerodayinitiative.com/advisories/ZDI-23-491/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability