// For flags

CVE-2009-1600

 

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apple Safari executes DOM calls in response to a javascript: URI in the target attribute of a submit element within a form contained in an inline PDF file, which might allow remote attackers to bypass intended Adobe Acrobat JavaScript restrictions on accessing the document object, as demonstrated by a web site that permits PDF uploads by untrusted users, and therefore has a shared document.domain between the web site and this javascript: URI. NOTE: the researcher reports that Adobe's position is "a PDF file is active content."

Apple Safari ejecuta llamadas DOM en respuesta a un javascript en el atributo "target" (objetivo) de un elemento submit dentro de un formulario contenido en un fichero PDF en línea, lo que puede permitir a usuarios remotos evitar las restricciones de Adobe Acrobat JavaScript de acceder al documento objeto, como se ha demostrado en un wervidor web que permite subir ficheros PDF por usuarios no confiables, y tener un document.domain compartido entre el servidor web y este javascript. NOTA: el investigador ha informado de que la posición de Adobe es "un fichero PDF es un contenido activo.".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-05-11 CVE Reserved
  • 2009-05-11 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apple
Search vendor "Apple"
Safari
Search vendor "Apple" for product "Safari"
*-
Affected
in Adobe
Search vendor "Adobe"
Acrobat Reader
Search vendor "Adobe" for product "Acrobat Reader"
7.0
Search vendor "Adobe" for product "Acrobat Reader" and version "7.0"
-
Safe