Remote Code Execution Vulnerability in Foxit PhantomPDF by Foxit Software
CVE-2021-27269
7.8HIGH
Summary
The vulnerability in Foxit PhantomPDF arises from improper handling of U3D objects within PDF files, enabling remote attackers to execute arbitrary code. By compelling users to visit malicious web pages or open compromised files, an attacker can manipulate unvalidated user input, leading to a potential write past the end of an allocated structure. This flaw highlights the necessity for stringent validation measures to secure user-generated content in PDF documents.
Affected Version(s)
PhantomPDF 10.1.0.37527
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mat Powell of Trend Micro Zero Day Initiative