Home

Description

Foxit PDF Reader <  4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs in.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-20 | Updated 2025-08-22 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-73 External Control of File Name or Path

Product status

Default status
unaffected

* before 4.3.1.0218
affected

Credits

Chris Evans finder

References

raw.githubusercontent.com/...ormat/foxit_reader_filewrite.rb exploit

www.exploit-db.com/exploits/16978 exploit

scarybeastsecurity.blogspot.com/...ite-bug-in-foxit-pdf.html technical-description exploit

www.foxit.com/pdf-reader/version-history.html vendor-advisory patch

www.vulncheck.com/.../foxit-pdf-reader-javascript-file-write third-party-advisory

cve.org (CVE-2011-10030)

nvd.nist.gov (CVE-2011-10030)

Download JSON