First published: Wed Apr 22 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the communication API. The issue lies in the handling of the CombineFiles command, which allows an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9830.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Phantompdf | <=9.7.1.29511 | |
Foxitsoftware Reader | <=9.7.1.29511 | |
Microsoft Windows | ||
Foxit PhantomPDF |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10892 is high with a rating of 8.8.
Foxit PhantomPDF versions up to 9.7.1.29511 and Foxit Reader versions up to 9.7.1.29511 are affected by CVE-2020-10892.
CVE-2020-10892 can be exploited by remote attackers who trick a user into visiting a malicious page or opening a malicious file.
Yes, user interaction is required to exploit CVE-2020-10892.
You can find more information about CVE-2020-10892 in the security bulletins released by Foxit Software and in the advisory published by Zero Day Initiative.