6.8
CVSSv2

CVE-2017-10952

Published: 29/08/2017 Updated: 09/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs JavaScript function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4518.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

foxitsoftware foxit reader 8.2.0.2051

Github Repositories

CVE-2017-10952 So this is a high level example of a local code execution attack on Foxit PDF reader Details of this attack can be found here [1] I've copy pasted the text description of this vulnerability linked in [1] here to preserve the description over time - the description was written by the author Root on vulnerscom Install Foxit Install Foxit_Reader_v83014

Recent Articles

Foxit PDF Reader is well and truly foxed up, but vendor won't patch
The Register • Richard Chirgwin • 21 Aug 2017

We've got Safe Mode and that's safe enough, vendor tells ~400m users

Updated The Zero Day Initiative (ZDI) has gone public with a Foxit PDF Reader vulnerability without a fix, because the vendor resisted patching. The ZDI made the decision last week that the two vulns, CVE-2017-10951 and CVE-2017-10952, warranted release so at least some of Foxit's 400 million users could protect themselves. In both cases, the only chance at mitigation is to use the software's "Secure Mode" when opening files, something that users might skip in normal circumstances. CVE-2017-1095...