CVE-2007-0045

Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
References
Link Resource
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
http://secunia.com/advisories/23483 Vendor Advisory
http://secunia.com/advisories/23691 Vendor Advisory
http://secunia.com/advisories/23812 Vendor Advisory
http://secunia.com/advisories/23877 Vendor Advisory
http://secunia.com/advisories/23882 Vendor Advisory
http://secunia.com/advisories/24457 Vendor Advisory
http://secunia.com/advisories/24533 Vendor Advisory
http://secunia.com/advisories/33754 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200701-16.xml
http://securityreason.com/securityalert/2090
http://securitytracker.com/id?1017469
http://securitytracker.com/id?1023007
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
http://www.adobe.com/support/security/advisories/apsa07-01.html Vendor Advisory
http://www.adobe.com/support/security/advisories/apsa07-02.html
http://www.adobe.com/support/security/bulletins/apsb07-01.html
http://www.adobe.com/support/security/bulletins/apsb09-15.html
http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 Exploit
http://www.gnucitizen.org/blog/danger-danger-danger/ Exploit Vendor Advisory
http://www.gnucitizen.org/blog/universal-pdf-xss-after-party
http://www.kb.cert.org/vuls/id/815960 Third Party Advisory US Government Resource
http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
http://www.redhat.com/support/errata/RHSA-2007-0021.html
http://www.securityfocus.com/archive/1/455790/100/0/threaded Exploit
http://www.securityfocus.com/archive/1/455800/100/0/threaded
http://www.securityfocus.com/archive/1/455801/100/0/threaded
http://www.securityfocus.com/archive/1/455831/100/0/threaded Exploit
http://www.securityfocus.com/archive/1/455836/100/0/threaded
http://www.securityfocus.com/archive/1/455906/100/0/threaded
http://www.securityfocus.com/bid/21858
http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
http://www.vupen.com/english/advisories/2007/0032 Vendor Advisory
http://www.vupen.com/english/advisories/2007/0957 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898 Vendor Advisory
http://www.wisec.it/vulns.php?page=9 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/31271
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693
https://rhn.redhat.com/errata/RHSA-2007-0017.html
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
http://secunia.com/advisories/23483 Vendor Advisory
http://secunia.com/advisories/23691 Vendor Advisory
http://secunia.com/advisories/23812 Vendor Advisory
http://secunia.com/advisories/23877 Vendor Advisory
http://secunia.com/advisories/23882 Vendor Advisory
http://secunia.com/advisories/24457 Vendor Advisory
http://secunia.com/advisories/24533 Vendor Advisory
http://secunia.com/advisories/33754 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200701-16.xml
http://securityreason.com/securityalert/2090
http://securitytracker.com/id?1017469
http://securitytracker.com/id?1023007
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1
http://www.adobe.com/support/security/advisories/apsa07-01.html Vendor Advisory
http://www.adobe.com/support/security/advisories/apsa07-02.html
http://www.adobe.com/support/security/bulletins/apsb07-01.html
http://www.adobe.com/support/security/bulletins/apsb09-15.html
http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 Exploit
http://www.gnucitizen.org/blog/danger-danger-danger/ Exploit Vendor Advisory
http://www.gnucitizen.org/blog/universal-pdf-xss-after-party
http://www.kb.cert.org/vuls/id/815960 Third Party Advisory US Government Resource
http://www.mozilla.org/security/announce/2007/mfsa2007-02.html
http://www.redhat.com/support/errata/RHSA-2007-0021.html
http://www.securityfocus.com/archive/1/455790/100/0/threaded Exploit
http://www.securityfocus.com/archive/1/455800/100/0/threaded
http://www.securityfocus.com/archive/1/455801/100/0/threaded
http://www.securityfocus.com/archive/1/455831/100/0/threaded Exploit
http://www.securityfocus.com/archive/1/455836/100/0/threaded
http://www.securityfocus.com/archive/1/455906/100/0/threaded
http://www.securityfocus.com/bid/21858
http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
http://www.vupen.com/english/advisories/2007/0032 Vendor Advisory
http://www.vupen.com/english/advisories/2007/0957 Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898 Vendor Advisory
http://www.wisec.it/vulns.php?page=9 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/31271
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693
https://rhn.redhat.com/errata/RHSA-2007-0017.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf - () http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -
References () http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html - () http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 -
References () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html - () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html -
References () http://secunia.com/advisories/23483 - Vendor Advisory () http://secunia.com/advisories/23483 - Vendor Advisory
References () http://secunia.com/advisories/23691 - Vendor Advisory () http://secunia.com/advisories/23691 - Vendor Advisory
References () http://secunia.com/advisories/23812 - Vendor Advisory () http://secunia.com/advisories/23812 - Vendor Advisory
References () http://secunia.com/advisories/23877 - Vendor Advisory () http://secunia.com/advisories/23877 - Vendor Advisory
References () http://secunia.com/advisories/23882 - Vendor Advisory () http://secunia.com/advisories/23882 - Vendor Advisory
References () http://secunia.com/advisories/24457 - Vendor Advisory () http://secunia.com/advisories/24457 - Vendor Advisory
References () http://secunia.com/advisories/24533 - Vendor Advisory () http://secunia.com/advisories/24533 - Vendor Advisory
References () http://secunia.com/advisories/33754 - Vendor Advisory () http://secunia.com/advisories/33754 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200701-16.xml - () http://security.gentoo.org/glsa/glsa-200701-16.xml -
References () http://securityreason.com/securityalert/2090 - () http://securityreason.com/securityalert/2090 -
References () http://securitytracker.com/id?1017469 - () http://securitytracker.com/id?1017469 -
References () http://securitytracker.com/id?1023007 - () http://securitytracker.com/id?1023007 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1 -
References () http://www.adobe.com/support/security/advisories/apsa07-01.html - Vendor Advisory () http://www.adobe.com/support/security/advisories/apsa07-01.html - Vendor Advisory
References () http://www.adobe.com/support/security/advisories/apsa07-02.html - () http://www.adobe.com/support/security/advisories/apsa07-02.html -
References () http://www.adobe.com/support/security/bulletins/apsb07-01.html - () http://www.adobe.com/support/security/bulletins/apsb07-01.html -
References () http://www.adobe.com/support/security/bulletins/apsb09-15.html - () http://www.adobe.com/support/security/bulletins/apsb09-15.html -
References () http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 - Exploit () http://www.disenchant.ch/blog/hacking-with-browser-plugins/34 - Exploit
References () http://www.gnucitizen.org/blog/danger-danger-danger/ - Exploit, Vendor Advisory () http://www.gnucitizen.org/blog/danger-danger-danger/ - Exploit, Vendor Advisory
References () http://www.gnucitizen.org/blog/universal-pdf-xss-after-party - () http://www.gnucitizen.org/blog/universal-pdf-xss-after-party -
References () http://www.kb.cert.org/vuls/id/815960 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/815960 - Third Party Advisory, US Government Resource
References () http://www.mozilla.org/security/announce/2007/mfsa2007-02.html - () http://www.mozilla.org/security/announce/2007/mfsa2007-02.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0021.html - () http://www.redhat.com/support/errata/RHSA-2007-0021.html -
References () http://www.securityfocus.com/archive/1/455790/100/0/threaded - Exploit () http://www.securityfocus.com/archive/1/455790/100/0/threaded - Exploit
References () http://www.securityfocus.com/archive/1/455800/100/0/threaded - () http://www.securityfocus.com/archive/1/455800/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455801/100/0/threaded - () http://www.securityfocus.com/archive/1/455801/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455831/100/0/threaded - Exploit () http://www.securityfocus.com/archive/1/455831/100/0/threaded - Exploit
References () http://www.securityfocus.com/archive/1/455836/100/0/threaded - () http://www.securityfocus.com/archive/1/455836/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455906/100/0/threaded - () http://www.securityfocus.com/archive/1/455906/100/0/threaded -
References () http://www.securityfocus.com/bid/21858 - () http://www.securityfocus.com/bid/21858 -
References () http://www.us-cert.gov/cas/techalerts/TA09-286B.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-286B.html - US Government Resource
References () http://www.vupen.com/english/advisories/2007/0032 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0032 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2007/0957 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/0957 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/2898 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/2898 - Vendor Advisory
References () http://www.wisec.it/vulns.php?page=9 - Exploit, Patch () http://www.wisec.it/vulns.php?page=9 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31271 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31271 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693 -
References () https://rhn.redhat.com/errata/RHSA-2007-0017.html - () https://rhn.redhat.com/errata/RHSA-2007-0017.html -

Information

Published : 2007-01-03 21:28

Updated : 2024-11-21 00:24


NVD link : CVE-2007-0045

Mitre link : CVE-2007-0045

CVE.ORG link : CVE-2007-0045


JSON object : View

Products Affected

adobe

  • acrobat_reader
  • acrobat
  • acrobat_3d
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')