Vulnerability Note VU#815960
Adobe Acrobat Plug-In cross domain violation
The Adobe Acrobat Plug-In fails to properly validate user-supplied content, which may allow for cross-site scripting.
Adobe Acrobat Reader is software designed to view Portable Document Format (PDF) files. Adobe also distributes the Adobe Acrobat Plug-In to allow users to view PDF files inside of a web browser.
The Adobe Acrobat Plug-In PDF Open Parameters feature allows users to specify actions to take on a PDF document via URI parameters. However, the Adobe Acrobat Plug-In fails to properly validate these URI parameters for scripting code. This allows user-supplied scripts to execute within the context of the web site hosting the PDF file causing a cross-site scripting vulnerability. More information about cross-site scripting is available in CERT Advisory CA-2000-02.
An attacker may be able to obtain sensitive data from a user that visits a web site hosting a PDF document. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted.
Preventing PDF documents from opening inside a web browser may mitigate this vulnerability. If this workaround is applied to updated versions of the Adobe reader, it may mitigate future vulnerabilities.
To prevent PDF documents from automatically being opened in a web browser:
Do not access PDF documents from untrusted sources
Do not open unfamiliar or unexpected PDF documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010. Any website that hosts a PDF document may be leveraged to exploit this vulnerability. Web site and network Administrators can take the following steps to prevent their web sites from being leveraged in attacks using this vulnerability:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Adobe||Affected||-||03 Jan 2007|
CVSS Metrics (Learn More)
This vulnerability was discovered and reported by Stefano Di Paola, Giorgio Fedon, and Elia Florio.
This document was written by Ryan Giobbi and Jeff Gennari.
- CVE IDs: CVE-2007-0045
- Date Public: 29 Dec 2006
- Date First Published: 03 Jan 2007
- Date Last Updated: 30 Apr 2008
- Severity Metric: 16.87
- Document Revision: 120
If you have feedback, comments, or additional information about this vulnerability, please send us email.