According to its version, the Foxit PDF Editor application (previously named Foxit PhantomPDF) installed on the remote Windows host, with versions prior to 11.2.6 and 12.1.2 are vulnerable:
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(170120);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/09");
script_cve_id("CVE-2022-43649");
script_xref(name:"IAVA", value:"2023-A-0128-S");
script_name(english:"Foxit PDF Editor < 11.2.6 and < 12.1.2 Vulnerability");
script_set_attribute(attribute:"synopsis", value:
"A PDF toolkit installed on the remote Windows host is affected by a vulnerability");
script_set_attribute(attribute:"description", value:
"According to its version, the Foxit PDF Editor application (previously named Foxit PhantomPDF) installed on the remote
Windows host, with versions prior to 11.2.6 and 12.1.2 are vulnerable:
- This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit
PDF Reader (Versions: 10.1.11.37866, 11.2.5.53785, 12.1.1.15289 and earlier versions are vulnerable). User interaction is required
to exploit this vulnerability - the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of
validating the existence of an object prior to performing operations on the object. An attacker can
leverage this vulnerability to execute code in the context of the current process. WAS ZDI-CAN-19478. (CVE-2022-43649)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://www.foxitsoftware.com/support/security-bulletins.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a27a3e57");
script_set_attribute(attribute:"solution", value:
"Upgrade to Foxit PDF Editor version 12.1.2 or later");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-43649");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/12/13");
script_set_attribute(attribute:"patch_publication_date", value:"2022/12/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantom");
script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantompdf");
script_set_attribute(attribute:"generated_plugin", value:"former");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("foxit_phantom_installed.nasl");
script_require_keys("installed_sw/FoxitPhantomPDF", "SMB/Registry/Enumerated");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'FoxitPhantomPDF', win_local:TRUE);
var constraints = [
{ 'min_version':'10.0', 'max_version':'10.1.11.37866', 'fixed_version' : '10.1.11' },
{ 'min_version' : '11.0', 'max_version':'11.2.5.53785', 'fixed_version' : '11.2.5' },
{ 'min_version' : '12.0', 'max_version' : '12.1.1.15289', 'fixed_version' : '12.1.2' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
foxitsoftware | phantom | cpe:/a:foxitsoftware:phantom | |
foxitsoftware | phantompdf | cpe:/a:foxitsoftware:phantompdf |