Vulnerability Description
Foxit PDF Reader < 4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs in.
Related Weaknesses (CWE)
References
- http://scarybeastsecurity.blogspot.com/2011/03/dangerous-file-write-bug-in-foxit
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/16978
- https://www.foxit.com/pdf-reader/version-history.html
- https://www.vulncheck.com/advisories/foxit-pdf-reader-javascript-file-write
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://scarybeastsecurity.blogspot.com/2011/03/dangerous-file-write-bug-in-foxi
- https://www.exploit-db.com/exploits/16978
FAQ
What is CVE-2011-10030?
CVE-2011-10030 is a documented vulnerability. Foxit PDF Reader < 4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that cal...
How severe is CVE-2011-10030?
CVSS scoring is not yet available for CVE-2011-10030. Check NVD for updates.
Is there a patch for CVE-2011-10030?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.