CVE-2020-15638

CWE-8433 documents3 sources
Severity
7.8HIGH
EPSS
0.8%
top 26.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 20
Latest updateMay 24

Description

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.2.29539. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the NodeProperties::InferReceiverMapsUnsafe method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDfoxitsoftware/phantompdf10.0.0.35798
CVEListV5foxit/phantompdf9.7.2.29539
NVDfoxitsoftware/reader10.0.0.35798

🔴Vulnerability Details

2
GHSA
GHSA-73qp-34j6-qp6c: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92022-05-24
CVEList
CVE-2020-15638: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 92020-08-19
CVE-2020-15638 (HIGH CVSS 7.8) | This vulnerability allows remote at | cvebase.io