Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the "Update Download Site" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/430869/100/0/threaded | mailing list |
http://www.osvdb.org/24588 | vdb entry |
http://www.adobe.com/support/techdocs/322699.html | vendor advisory |
http://secunia.com/advisories/15924 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25770 | vdb entry |
http://secunia.com/secunia_research/2005-68/advisory/ | vendor advisory |
http://www.vupen.com/english/advisories/2006/1342 | vdb entry |
http://www.securityfocus.com/bid/17500 | vdb entry |