Overview
The Adobe Acrobat Plug-In fails to properly validate user-supplied content, which may allow for cross-site scripting.
Description
Adobe Acrobat Reader is software designed to view Portable Document Format (PDF) files. Adobe also distributes the Adobe Acrobat Plug-In to allow users to view PDF files inside of a web browser. The Adobe Acrobat Plug-In PDF Open Parameters feature allows users to specify actions to take on a PDF document via URI parameters. However, the Adobe Acrobat Plug-In fails to properly validate these URI parameters for scripting code. This allows user-supplied scripts to execute within the context of the web site hosting the PDF file causing a cross-site scripting vulnerability. More information about cross-site scripting is available in CERT Advisory CA-2000-02. |
Impact
An attacker may be able to obtain sensitive data from a user that visits a web site hosting a PDF document. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted. |
Solution
Upgrade |
Disable JavaScript For instructions on how to disable JavaScript, please refer to the Securing Your Web Browser document. Do not open unfamiliar or unexpected PDF documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Any website that hosts a PDF document may be leveraged to exploit this vulnerability. Web site and network Administrators can take the following steps to prevent their web sites from being leveraged in attacks using this vulnerability: Filter JavaScript in URLs Webserver administrators may be able to prevent their websites from being leveraged in attacks by deploying a reverse proxy that can filter JavaScript in URLs. Filter JavaScript leaving the network Network administrators may be able to prevent their clients being affected by this vulnerability by deploying a proxy server or firewall that can filter JavaScript in URLs. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.adobe.com/support/security/
- http://secunia.com/advisories/23691/advisories/apsa07-01.html
- http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
- http://www.wisec.it/vulns.php?page=9
- http://secunia.com/advisories/23483/
- http://www.adobe.com/devnet/acrobat/pdfs/PDFOpenParameters.pdf
- http://en.wikipedia.org/wiki/Reverse_proxy
- http://www.securityfocus.com/bid/21858
- http://secunia.com/advisories/23882/
- http://secunia.com/advisories/23877/
- http://secunia.com/advisories/23812/
- http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
- http://secunia.com/advisories/24533/
Acknowledgements
This vulnerability was discovered and reported by Stefano Di Paola, Giorgio Fedon, and Elia Florio.
This document was written by Ryan Giobbi and Jeff Gennari.
Other Information
CVE IDs: | CVE-2007-0045 |
Severity Metric: | 16.87 |
Date Public: | 2006-12-29 |
Date First Published: | 2007-01-03 |
Date Last Updated: | 2008-04-30 23:50 UTC |
Document Revision: | 120 |