CVE-2019-7989
Adobe Photoshop JSX File ExtendScript Folder.rename Insufficient UI Warning Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Photoshop CC versiones 19.1.8 y anteriores y 20.0.5 y anteriores tienen una vulnerabilidad de inyección de comandos. La explotación exitosa podría conducir a la ejecución de código arbitrario.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Photoshop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of the Folder.rename method when processing JSX files. When opening a JSX file, the user interface fails to warn the user of unsafe actions. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-02-12 CVE Reserved
- 2019-08-26 CVE Published
- 2024-08-04 CVE Updated
- 2024-11-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-19-768 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-769 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-770 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-771 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-772 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-773 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-774 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-775 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-776 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-777 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-778 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-19-779 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://helpx.adobe.com/security/products/photoshop/apsb19-44.html | 2021-09-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Adobe Search vendor "Adobe" | Photoshop Cc Search vendor "Adobe" for product "Photoshop Cc" | <= 19.1.8 Search vendor "Adobe" for product "Photoshop Cc" and version " <= 19.1.8" | - |
Affected
| in | Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Photoshop Cc Search vendor "Adobe" for product "Photoshop Cc" | <= 19.1.8 Search vendor "Adobe" for product "Photoshop Cc" and version " <= 19.1.8" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Photoshop Cc Search vendor "Adobe" for product "Photoshop Cc" | >= 20.0 <= 20.0.5 Search vendor "Adobe" for product "Photoshop Cc" and version " >= 20.0 <= 20.0.5" | - |
Affected
| in | Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Photoshop Cc Search vendor "Adobe" for product "Photoshop Cc" | >= 20.0 <= 20.0.5 Search vendor "Adobe" for product "Photoshop Cc" and version " >= 20.0 <= 20.0.5" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|