Lucene search

K
zdiMatthias KaiserZDI-16-289
HistoryMay 10, 2016 - 12:00 a.m.

Adobe Acrobat Reader DC Net.HTTP.runTaskSet Javascript API Restrictions Bypass Vulnerability

2016-05-1000:00:00
Matthias Kaiser
www.zerodayinitiative.com
12

0.043 Low

EPSS

Percentile

92.4%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC.User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Net.HTTP.runTaskSet method. By creating a specially crafted PDF with specific Javascript instructions, it is possible to bypass the Javascript API restrictions. A remote attacker could exploit this vulnerability to execute arbitrary code.