First published: Fri May 03 2024(Updated: )
Foxit PDF Editor XLS File Parsing Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XLS files. The issue results from the lack of proper restrictions on macro-enabled documents. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-19738.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Editor for Mac |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27364 has been classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2023-27364, users should update to the latest version of Foxit PDF Editor provided by the vendor.
CVE-2023-27364 affects users of Foxit PDF Editor, specifically the Windows version.
CVE-2023-27364 is a remote code execution vulnerability that requires user interaction for exploitation.
Attackers exploiting CVE-2023-27364 can execute arbitrary code on the affected installations of Foxit PDF Editor.