Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Adobe Document Server for Reader Extensions < 6.1 Multiple Vulnerabilities


Vulnerability Assessment Details

Adobe Document Server for Reader Extensions < 6.1 Multiple Vulnerabilities

Vulnerability Assessment Summary
Tries to exploit an XSS flaw in Adobe Document Server for Reader Extensions

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by multiple flaws.

Description :

The remote host is running Adobe Document Server, a server that
dynamically creates and manipulates PDF documents as well as graphic
images.

The version of Adobe Document Server installed on the remote host
includes the Adobe Document Server for Reader Extensions component,
which itself is affected by several issues :

- Missing Access Controls
An authenticated user can gain access to functionality to which
they should not have access by manipulating the 'actionID' and
'pageID' parameters.

- Cross-Site Scripting Flaws
The application fails to sanitize input to several parameters
before using it to generate dynamic web content.

- Information Disclosure
The application exposes a user's session id in the Referer
header, which can lead to a loss of confidentiality. Also,
the application returns different error messages during
unsuccessful authentication attempts, which can be used to
enumerate users.

See also :

http://secunia.com/secunia_research/2005-68/advisory/
http://www.adobe.com/support/techdocs/322699.html
http://www.adobe.com/support/techdocs/331915.html
http://www.adobe.com/support/techdocs/331917.html

Solution :

Upgrade to Adobe Document Server for Reader Extensions 6.1 / LiveCycle
Reader Extensions 7.0 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 17500

Vulnerability Assessment Copyright: This script is Copyright (C) 2006-2007 Tenable Network Security

Cables, Connectors


100-000000314-04 AMD EPYC 7763 64-Core 2.45GHz ES Processor *NO VENDOR LOCKED* picture

100-000000314-04 AMD EPYC 7763 64-Core 2.45GHz ES Processor *NO VENDOR LOCKED*

$1099.00



Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc... picture

Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...

$419.99



Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1 picture

Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1

$39.99



Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc... picture

Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...

$619.99



Intel Quad Core i3-12100 3.3GHz 12MB LGA1700 12th Gen. CPU Processor SRL62 picture

Intel Quad Core i3-12100 3.3GHz 12MB LGA1700 12th Gen. CPU Processor SRL62

$45.96



AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor picture

AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor

$79.00



Intel Core i5-6500 3.2 GHz 8 GT/s LGA 1151 Desktop CPU Processor SR2BX picture

Intel Core i5-6500 3.2 GHz 8 GT/s LGA 1151 Desktop CPU Processor SR2BX

$22.99



AMD FX-6300 FD6300WMW6KHK 6-Cores 3.5GHz 3x2MB 8MB Socket AM3+ Processor picture

AMD FX-6300 FD6300WMW6KHK 6-Cores 3.5GHz 3x2MB 8MB Socket AM3+ Processor

$11.99



Intel Core i7-3770 3.40GHz 8MB Quad Core Socket LGA1155 CPU Processor SR0PK picture

Intel Core i7-3770 3.40GHz 8MB Quad Core Socket LGA1155 CPU Processor SR0PK

$35.00



Intel 16 Core i7-13700T DESKTOP processor TURBO Boost 4.90Ghz CM8071504820903 picture

Intel 16 Core i7-13700T DESKTOP processor TURBO Boost 4.90Ghz CM8071504820903

$269.00



Discussions

No Discussions have been posted on this vulnerability.