Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.FOXIT_PDF_EDITOR_12_1.NASL
HistoryJan 18, 2023 - 12:00 a.m.

Foxit PDF Editor < 11.2.6 and < 12.1.2 Vulnerability

2023-01-1800:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
17
foxit pdf editor
remote code execution
annotation objects
windows host
vulnerability
cve-2022-43649

0.025 Low

EPSS

Percentile

90.2%

According to its version, the Foxit PDF Editor application (previously named Foxit PhantomPDF) installed on the remote Windows host, with versions prior to 11.2.6 and 12.1.2 are vulnerable:

  • This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader (Versions: 10.1.11.37866, 11.2.5.53785, 12.1.1.15289 and earlier versions are vulnerable). User interaction is required to exploit this vulnerability - the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. WAS ZDI-CAN-19478. (CVE-2022-43649)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(170120);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/09");

  script_cve_id("CVE-2022-43649");
  script_xref(name:"IAVA", value:"2023-A-0128-S");

  script_name(english:"Foxit PDF Editor < 11.2.6 and < 12.1.2 Vulnerability");

  script_set_attribute(attribute:"synopsis", value:
"A PDF toolkit installed on the remote Windows host is affected by a vulnerability");
  script_set_attribute(attribute:"description", value:
"According to its version, the Foxit PDF Editor application (previously named Foxit PhantomPDF) installed on the remote
Windows host, with versions prior to 11.2.6 and 12.1.2 are vulnerable:

  - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit
    PDF Reader (Versions: 10.1.11.37866, 11.2.5.53785, 12.1.1.15289 and earlier versions are vulnerable). User interaction is required 
    to exploit this vulnerability - the target must visit a malicious page or open a malicious file. 
    The specific flaw exists within the handling of Annotation objects. The issue results from the lack of 
    validating the existence of an object prior to performing operations on the object. An attacker can 
    leverage this vulnerability to execute code in the context of the current process. WAS ZDI-CAN-19478. (CVE-2022-43649)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://www.foxitsoftware.com/support/security-bulletins.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a27a3e57");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Foxit PDF Editor version 12.1.2 or later");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-43649");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/12/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/12/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/01/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantom");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantompdf");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("foxit_phantom_installed.nasl");
  script_require_keys("installed_sw/FoxitPhantomPDF", "SMB/Registry/Enumerated");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::get_app_info(app:'FoxitPhantomPDF', win_local:TRUE);

var constraints = [
  { 'min_version':'10.0', 'max_version':'10.1.11.37866', 'fixed_version' : '10.1.11' },
  { 'min_version' : '11.0', 'max_version':'11.2.5.53785', 'fixed_version' : '11.2.5' },
  { 'min_version' : '12.0', 'max_version' : '12.1.1.15289', 'fixed_version' : '12.1.2' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
foxitsoftwarephantomcpe:/a:foxitsoftware:phantom
foxitsoftwarephantompdfcpe:/a:foxitsoftware:phantompdf

0.025 Low

EPSS

Percentile

90.2%

Related for FOXIT_PDF_EDITOR_12_1.NASL