First published: Tue Jan 04 2022(Updated: )
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Advanced PDF Editor | <11.1 | |
Foxit Reader | <11.1 | |
macOS | ||
All of | ||
Any of | ||
Foxit Advanced PDF Editor | <11.1 | |
Foxit Reader | <11.1 | |
macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45979 has a high severity rating as it allows remote attackers to execute arbitrary code.
To fix CVE-2021-45979, you should update Foxit PDF Reader and PDF Editor to version 11.1 or later.
CVE-2021-45979 affects Foxit PDF Reader and PDF Editor versions prior to 11.1 on macOS.
Yes, CVE-2021-45979 can be exploited remotely, potentially without user interaction.
While there is no official workaround, avoiding the use of the JavaScript API features in the affected versions may reduce risk.