HTTP: Foxit PhantomPDF AcroForm addWatermarkFromText Object Use After Free

This signature detects attempts to exploit a known vulnerability against Foxit PhantomPDF. A successful attack can lead to arbitrary code execution.

Extended Description

This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of watermarks in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9358.

References

CVE: CVE-2020-8845

Short Name
HTTP:STC:DL:FOXIT-PHANTOM-UAF
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
AcroForm After CVE-2020-8845 Foxit Free Object PhantomPDF Use addWatermarkFromText
Release Date
07/28/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3495
False Positive
Unknown
CVSS Score

6.8

Found a potential security threat?