CVE-2019-13318Use of Externally-Controlled Format String in Reader

Severity
5.5MEDIUMNVD
EPSS
0.9%
top 24.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4
Latest updateMay 24

Description

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the util.printf Javascript method. The application processes the %p parameter in the format string, allowing heap addresses to be returned to the script. An attacker can leverage this in

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDfoxitsoftware/reader9.5.0.20723
CVEListV5foxit/reader9.5.0.20723
NVDfoxitsoftware/phantompdf9.09.5.0.20723+1

🔴Vulnerability Details

2
GHSA
GHSA-m5qf-r8x2-gf8g: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 92022-05-24
CVEList
CVE-2019-13318: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 92019-10-04
CVE-2019-13318 — Foxitsoftware Reader vulnerability | cvebase