Lucene search

K
ubuntucveUbuntu.comUB:CVE-2009-1597
HistoryMay 11, 2009 - 12:00 a.m.

CVE-2009-1597

2009-05-1100:00:00
ubuntu.com
ubuntu.com
8

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

71.9%

Mozilla Firefox executes DOM calls in response to a javascript: URI in the
target attribute of a submit element within a form contained in an inline
PDF file, which might allow remote attackers to bypass intended Adobe
Acrobat JavaScript restrictions on accessing the document object, as
demonstrated by a web site that permits PDF uploads by untrusted users, and
therefore has a shared document.domain between the web site and this
javascript: URI. NOTE: the researcher reports that Adobe’s position is “a
PDF file is active content.”

Notes

Author Note
jdstrand Requires inline PDF with acroread. PDF is active content, ignoring until upstream has more information.

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

71.9%

Related for UB:CVE-2009-1597