First published: Wed Apr 22 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the communication API. The issue lies in the handling of the ConvertToPDF command, which allows an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9829.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PhantomPDF | ||
Foxitsoftware Phantompdf | <=9.7.1.29511 | |
Foxitsoftware Reader | <=9.7.1.29511 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10890 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478.
CVE-2020-10890 has a severity score of 8.8, which is considered high.
Foxit PhantomPDF versions up to and including 9.7.1.29511, and Foxit Reader versions up to and including 9.7.1.29511 are affected by CVE-2020-10890.
The target must either visit a malicious page or open a malicious file to exploit CVE-2020-10890.
You can find more information about CVE-2020-10890 in the security bulletins on the Foxit Software support website and the Zero Day Initiative advisory.