PDF Silent HTTP Form Repurposing Attacks

2009-05-11 / 2009-05-12
Credit: Aditya K Sood
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-287

Hi This paper sheds light on the modified approach to trigger web attacks through JavaScript protocol handler in the context of browser when a PDF is opened in it. As we have seen, the kind of security mechanism implemented by Adobe in order to remove the insecurities that originate directly from the standalone PDF document in order to circumvent cross domain access. The attack is targeted on the web applications that allow PDF documents to be uploaded on the web server. http://secniche.org/papers/SNS_09_03_PDF_Silent_Form_Re_Purp_Attack.pdf Regards Aditya KS http://www.secniche.org

References:

http://www.securityfocus.com/archive/1/archive/1/503183/100/0/threaded
http://secniche.org/papers/SNS_09_03_PDF_Silent_Form_Re_Purp_Attack.pdf


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top