CVE-2020-10892Cross-Site Request Forgery in Phantompdf

Severity
8.8HIGHNVD
EPSS
1.6%
top 18.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the communication API. The issue lies in the handling of the CombineFiles command, which allows an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability to execute co

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDfoxitsoftware/phantompdf9.7.1.29511
CVEListV5foxit/phantompdf9.7.0.29478
NVDfoxitsoftware/reader9.7.1.29511

🔴Vulnerability Details

2
GHSA
GHSA-4h3x-gr3p-q99h: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92022-05-24
CVEList
CVE-2020-10892: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92020-04-22
CVE-2020-10892 — Cross-Site Request Forgery | cvebase