CVE-2007-0045

Current Description

Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."

Referenced by CVEs:CVE-2007-1199

Basic Data

PublishedJanuary 03, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAdobeAcrobat7.0*professional*****
    2.3ApplicationAdobeAcrobat7.0*standard*****
    2.3ApplicationAdobeAcrobat7.0.1*professional*****
    2.3ApplicationAdobeAcrobat7.0.1*standard*****
    2.3ApplicationAdobeAcrobat7.0.2*professional*****
    2.3ApplicationAdobeAcrobat7.0.2*standard*****
    2.3ApplicationAdobeAcrobat7.0.3*professional*****
    2.3ApplicationAdobeAcrobat7.0.3*standard*****
    2.3ApplicationAdobeAcrobat7.0.4*professional*****
    2.3ApplicationAdobeAcrobat7.0.4*standard*****
    2.3ApplicationAdobeAcrobat7.0.5*professional*****
    2.3ApplicationAdobeAcrobat7.0.5*standard*****
    2.3ApplicationAdobeAcrobat7.0.6*professional*****
    2.3ApplicationAdobeAcrobat7.0.6*standard*****
    2.3ApplicationAdobeAcrobat7.0.7*professional*****
    2.3ApplicationAdobeAcrobat7.0.7*standard*****
    2.3ApplicationAdobeAcrobat**elements*****7.0.8
    2.3ApplicationAdobeAcrobat7.0.8*professional*****
    2.3ApplicationAdobeAcrobat7.0.8*standard*****
    2.3ApplicationAdobeAcrobat 3d********
    2.3ApplicationAdobeAcrobat Reader6.0*******
    2.3ApplicationAdobeAcrobat Reader6.0.1*******
    2.3ApplicationAdobeAcrobat Reader6.0.2*******
    2.3ApplicationAdobeAcrobat Reader6.0.3*******
    2.3ApplicationAdobeAcrobat Reader6.0.4*******
    2.3ApplicationAdobeAcrobat Reader6.0.5*******
    2.3ApplicationAdobeAcrobat Reader7.0*******
    2.3ApplicationAdobeAcrobat Reader7.0.1*******
    2.3ApplicationAdobeAcrobat Reader7.0.2*******
    2.3ApplicationAdobeAcrobat Reader7.0.3*******
    2.3ApplicationAdobeAcrobat Reader7.0.4*******
    2.3ApplicationAdobeAcrobat Reader7.0.5*******
    2.3ApplicationAdobeAcrobat Reader7.0.6*******
    2.3ApplicationAdobeAcrobat Reader7.0.7*******
    2.3ApplicationAdobeAcrobat Reader7.0.8*******

Vulnerable Software List

VendorProductVersions
Adobe Acrobat 3d *
Adobe Acrobat *, 7.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8
Adobe Acrobat Reader 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 7.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8

References

NameSourceURLTags
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdfhttp://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdfMISC
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.htmlhttp://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.htmlCONFIRM
HPSBUX02153http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742HP
SUSE-SA:2007:011http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.htmlSUSE
23483http://secunia.com/advisories/23483SECUNIAVendor Advisory
23691http://secunia.com/advisories/23691SECUNIAVendor Advisory
23812http://secunia.com/advisories/23812SECUNIAVendor Advisory
23877http://secunia.com/advisories/23877SECUNIAVendor Advisory
23882http://secunia.com/advisories/23882SECUNIAVendor Advisory
24457http://secunia.com/advisories/24457SECUNIAVendor Advisory
24533http://secunia.com/advisories/24533SECUNIAVendor Advisory
33754http://secunia.com/advisories/33754SECUNIAVendor Advisory
GLSA-200701-16http://security.gentoo.org/glsa/glsa-200701-16.xmlGENTOO
2090http://securityreason.com/securityalert/2090SREASON
1017469http://securitytracker.com/id?1017469SECTRACK
1023007http://securitytracker.com/id?1023007SECTRACK
SSA:2007-066-05http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131SLACKWARE
102847http://sunsolve.sun.com/search/document.do?assetkey=1-26-102847-1SUNALERT
http://www.adobe.com/support/security/advisories/apsa07-01.htmlhttp://www.adobe.com/support/security/advisories/apsa07-01.htmlCONFIRMVendor Advisory
http://www.adobe.com/support/security/advisories/apsa07-02.htmlhttp://www.adobe.com/support/security/advisories/apsa07-02.htmlCONFIRM
http://www.adobe.com/support/security/bulletins/apsb07-01.htmlhttp://www.adobe.com/support/security/bulletins/apsb07-01.htmlCONFIRM
http://www.adobe.com/support/security/bulletins/apsb09-15.htmlhttp://www.adobe.com/support/security/bulletins/apsb09-15.htmlCONFIRM
http://www.disenchant.ch/blog/hacking-with-browser-plugins/34http://www.disenchant.ch/blog/hacking-with-browser-plugins/34MISCExploit
http://www.gnucitizen.org/blog/danger-danger-danger/http://www.gnucitizen.org/blog/danger-danger-danger/CONFIRMExploit Vendor Advisory
http://www.gnucitizen.org/blog/universal-pdf-xss-after-partyhttp://www.gnucitizen.org/blog/universal-pdf-xss-after-partyMISC
VU#815960http://www.kb.cert.org/vuls/id/815960CERT-VNThird Party Advisory US Government Resource
http://www.mozilla.org/security/announce/2007/mfsa2007-02.htmlhttp://www.mozilla.org/security/announce/2007/mfsa2007-02.htmlCONFIRM
RHSA-2007:0021http://www.redhat.com/support/errata/RHSA-2007-0021.htmlREDHAT
20070103 Universal XSS with PDF files: highly dangeroushttp://www.securityfocus.com/archive/1/455790/100/0/threadedBUGTRAQExploit
20070103 Re: Universal XSS with PDF files: highly dangeroushttp://www.securityfocus.com/archive/1/455800/100/0/threadedBUGTRAQ
20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilitieshttp://www.securityfocus.com/archive/1/455801/100/0/threadedBUGTRAQ
20070103 Re: [WEB SECURITY] Universal XSS with PDF files: highly dangeroushttp://www.securityfocus.com/archive/1/455831/100/0/threadedBUGTRAQExploit
20070103 RE: [WEB SECURITY] Universal XSS with PDF files: highly dangeroushttp://www.securityfocus.com/archive/1/455836/100/0/threadedBUGTRAQ
20070104 Universal PDF XSS After Partyhttp://www.securityfocus.com/archive/1/455906/100/0/threadedBUGTRAQ
21858http://www.securityfocus.com/bid/21858BID
TA09-286Bhttp://www.us-cert.gov/cas/techalerts/TA09-286B.htmlCERTUS Government Resource
ADV-2007-0032http://www.vupen.com/english/advisories/2007/0032VUPENVendor Advisory
ADV-2007-0957http://www.vupen.com/english/advisories/2007/0957VUPENVendor Advisory
ADV-2009-2898http://www.vupen.com/english/advisories/2009/2898VUPENVendor Advisory
http://www.wisec.it/vulns.php?page=9http://www.wisec.it/vulns.php?page=9MISCExploit Patch
adobe-acrobat-pdf-xss(31271)https://exchange.xforce.ibmcloud.com/vulnerabilities/31271XF
oval:org.mitre.oval:def:6487https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6487OVAL
oval:org.mitre.oval:def:9693https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9693OVAL
RHSA-2007:0017https://rhn.redhat.com/errata/RHSA-2007-0017.htmlREDHAT