The Adobe Acrobat Plug-In fails to properly validate user-supplied content, which may allow for cross-site scripting.
Adobe Acrobat Reader is software designed to view Portable Document Format (PDF) files. Adobe also distributes the Adobe Acrobat Plug-In to allow users to view PDF files inside of a web browser.
The Adobe Acrobat Plug-In PDF Open Parameters feature allows users to specify actions to take on a PDF document via URI parameters. However, the Adobe Acrobat Plug-In fails to properly validate these URI parameters for scripting code. This allows user-supplied scripts to execute within the context of the web site hosting the PDF file causing a cross-site scripting vulnerability. More information about cross-site scripting is available in CERT Advisory CA-2000-02.
An attacker may be able to obtain sensitive data from a user that visits a web site hosting a PDF document. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted.
Do not open unfamiliar or unexpected PDF documents, particularly those hosted on web sites or delivered as email attachments. Please see Cyber Security Tip ST04-010.
Any website that hosts a PDF document may be leveraged to exploit this vulnerability. Web site and network Administrators can take the following steps to prevent their web sites from being leveraged in attacks using this vulnerability:
This vulnerability was discovered and reported by Stefano Di Paola, Giorgio Fedon, and Elia Florio.
This document was written by Ryan Giobbi and Jeff Gennari.
|Date First Published:||2007-01-03|
|Date Last Updated:||2008-04-30 23:50 UTC|