Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the "Update Download Site" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries.
References
Configurations
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15924 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-68/advisory/ - Vendor Advisory | |
References | () http://www.adobe.com/support/techdocs/322699.html - Vendor Advisory | |
References | () http://www.osvdb.org/24588 - | |
References | () http://www.securityfocus.com/archive/1/430869/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17500 - | |
References | () http://www.vupen.com/english/advisories/2006/1342 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25770 - |
Information
Published : 2006-04-13 22:02
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1785
Mitre link : CVE-2006-1785
CVE.ORG link : CVE-2006-1785
JSON object : View
Products Affected
adobe
- document_server
CWE