Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310834085
HistoryJun 21, 2024 - 12:00 a.m.

Foxit PhantomPDF Multiple Vulnerabilities (June-4 2024)

2024-06-2100:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
4
foxit phantompdf
multiple vulnerabilities
june-4 2024
cve-2023-27363
remote code execution
windows
update

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

57.8%

Foxit PhantomPDF is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:foxitsoftware:phantompdf";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.834085");
  script_version("2024-06-26T05:05:39+0000");
  script_cve_id("CVE-2023-27363", "CVE-2023-27364", "CVE-2023-27365", "CVE-2023-27366");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-06-26 05:05:39 +0000 (Wed, 26 Jun 2024)");
  script_tag(name:"creation_date", value:"2024-06-21 11:16:04 +0530 (Fri, 21 Jun 2024)");
  script_name("Foxit PhantomPDF Multiple Vulnerabilities (June-4 2024)");

  script_tag(name:"summary", value:"Foxit PhantomPDF is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"These vulnerabilities exist:

  - CVE-2023-27363: A remote code execution vulnerability

  - CVE-2023-27364: A remote code execution vulnerability.");

  script_tag(name:"impact", value:"Successful exploitation allows an attacker
  to execute remote code.");

  script_tag(name:"affected", value:"Foxit PhantomPDF version 12.x through
  12.1.1.15289, 11.x through 11.2.5.53785, 10.1.11.37866 and prior on
  Windows.");

  script_tag(name:"solution", value:"Update to version 10.1.12 or 11.2.6 or
  12.1.2 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_dependencies("gb_foxit_phantom_reader_detect.nasl");
  script_mandatory_keys("foxit/phantompdf/ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);

vers = infos["version"];
path = infos["location"];

if(version_is_less_equal(version:vers, test_version:"10.1.11.37866")) {
  fix = "10.1.12";
}

if(version_in_range(version:vers, test_version:"11.0", test_version2:"11.2.5.53785")) {
  fix = "11.2.6";
}

if(version_in_range(version:vers, test_version:"12.0", test_version2:"12.1.1.15289")) {
  fix = "12.1.2";
}

if(fix) {
  report = report_fixed_ver(installed_version:vers, fixed_version:fix, install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.002

Percentile

57.8%

Related for OPENVAS:1361412562310834085