Lucene search

K
exploitdbStefano Di PaolaEDB-ID:3084
HistoryJan 05, 2007 - 12:00 a.m.

Adobe Acrobat Reader Plugin 7.0.x - 'acroreader' Cross-Site Scripting

2007-01-0500:00:00
Stefano Di Paola
www.exploit-db.com
54

AI Score

7.4

Confidence

Low

# Stefano Di Paola
# http://www.wisec.it/

From Secunia:
Input passed to a hosted PDF file is not properly sanitised by the browser plug-in
before being returned to users. This can be exploited to execute arbitrary script code in
a user's browser session in context of an affected site.

Example:
- http://[host]/[filename].pdf#[some text]=javascript:[code]

# milw0rm.com [2007-01-05]