V
Scaner-VSvulnerability catalog · v4.2
CVE-2017-10952
CVE
HighConfirmedExploit available

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interac…

CVSS
8.8
High
EPSS
0.07
p91
Published
2017-01-01
Updated
2017-01-01
Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs JavaScript function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4518.

Tags · CWE
Pre-auth
CWE-693
CAPEC-1
CAPEC-17
CAPEC-20
CAPEC-22
CAPEC-36
CAPEC-51
CAPEC-57
CAPEC-59
CAPEC-65
CAPEC-74
CAPEC-87
CAPEC-107
CAPEC-127
CAPEC-237
CAPEC-477
CAPEC-480
CAPEC-668
Affected products
Foxit_reader
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Timeline
2017-01-01
Published
2017-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: R
Required (R)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.073 · p91
Known exploited (KEV)
No
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-57 · CWE-693
└ via CAPEC-127 · CWE-693
└ via CAPEC-668 · CWE-693
└ via CAPEC-480 · CWE-693
Known exploits — Сканер-ВС
CVE-2017-10952
github-poc · https://github.com/afbase/CVE-2017-10952
Enterprise
Affected software
ProductVendorStatus
foxit_reader*Tracked
Source databases
CVE