CVE-2023-35985

HIGH

Foxit Reader 12.1.3.15356 - Code Injection

Title source: llm
STIX 2.1

Description

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.

Exploits (2)

nomisec STUB 4 stars
by SpiralBL0CK · poc
https://github.com/SpiralBL0CK/-CVE-2023-35985
nomisec STUB
by N00BIER · poc
https://github.com/N00BIER/CVE-2023-35985

Scores

CVSS v3 8.8
EPSS 0.0032
EPSS Percentile 55.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-610 CWE-73
Status published
Products (1)
foxitsoftware/foxit_reader 12.1.3.15356
Published Nov 27, 2023
Tracked Since Feb 18, 2026