CVE-2020-10891Type Confusion in Phantompdf

CWE-843Type Confusion3 documents3 sources
Severity
7.8HIGHNVD
EPSS
0.4%
top 40.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Save command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDfoxitsoftware/phantompdf9.7.1.29511
CVEListV5foxit/phantompdf9.7.0.29478
NVDfoxitsoftware/reader9.7.1.29511

🔴Vulnerability Details

2
GHSA
GHSA-67x3-jch4-2mj6: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92022-05-24
CVEList
CVE-2020-10891: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92020-04-22
CVE-2020-10891 — Type Confusion in Phantompdf | cvebase