Описание
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs method. The application exposes a JavaScript interface that allows the attacker to write arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-17527.
Ссылки
- Release Notes
- Release NotesThird Party AdvisoryVDB Entry
- Release Notes
- Release NotesThird Party AdvisoryVDB Entry
Уязвимые конфигурации
EPSS
7.8 High
CVSS3
7.8 High
CVSS3
Дефекты
Связанные уязвимости
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs method. The application exposes a JavaScript interface that allows the attacker to write arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-17527.
Уязвимость метода saveAs программы просмотра и редактирования PDF документов PDF-XChange, позволяющая нарушителю выполнить произвольный код
EPSS
7.8 High
CVSS3
7.8 High
CVSS3