PDF-XChange Editor createDataObject Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the createDataObject method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-20594.
References
Configurations
No configuration.
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1147/ - |
03 May 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 03:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39506
Mitre link : CVE-2023-39506
CVE.ORG link : CVE-2023-39506
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')