Remote Code Execution Vulnerability in Foxit PhantomPDF by Foxit Software
CVE-2021-27269

7.8HIGH

Key Information:

Vendor
Foxit
Vendor
CVE Published:
30 March 2021

Summary

The vulnerability in Foxit PhantomPDF arises from improper handling of U3D objects within PDF files, enabling remote attackers to execute arbitrary code. By compelling users to visit malicious web pages or open compromised files, an attacker can manipulate unvalidated user input, leading to a potential write past the end of an allocated structure. This flaw highlights the necessity for stringent validation measures to secure user-generated content in PDF documents.

Affected Version(s)

PhantomPDF 10.1.0.37527

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mat Powell of Trend Micro Zero Day Initiative
.