HTTP: Foxit Reader Javascript exportDataObject arbitrary file creation

This signature detects attempts to exploit a known vulnerability against Foxit reader exportDataObject. A successful attack can lead to arbitrary code execution.

Extended Description

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

Affected Products

Foxitsoftware foxit_reader

References

CVE: CVE-2023-35985

Short Name
HTTP:STC:FOXIT-READER-EXPORT
Severity
Major
Recommended
True
Recommended Action
None
Category
HTTP
Keywords
CVE-2023-35985 CVE-2023-40194 Foxit Javascript Reader arbitrary creation exportDataObject file
Release Date
01/11/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3668
False Positive
Unknown
Vendors

Foxitsoftware

Found a potential security threat?