vendor:
PDF Explorer
by:
Achilles
7.5
CVSS
HIGH
SEH Local Exploit
119
CWE
Product Name: PDF Explorer
Affected Version From: 1.5.66.2
Affected Version To: 1.5.66.2
Patch Exists: YES
Related CWE: N/A
CPE: a:rtt_software:pdf_explorer
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows XP SP3
2018
PDF Explorer SEH Local Exploit
This exploit is a SEH Local Exploit for PDF Explorer. It was originally discovered by Gionathan 'John' Reale (DoS exploit). The exploit author is Achilles and it was published on 18-12-2018. The vendor homepage is http://www.rttsoftware.com/ and the software link is https://www.rttsoftware.com/files/PDFExplorerTrialSetup.zip. The tested version is 1.5.66.2 and it was tested on Windows XP SP3. The exploit involves running a python code, opening EVIL.txt and copying its content to clipboard, opening PDF Explorer, clicking 'Database' > 'Custom fields settings...', pasting the content of EVIL.txt into the Field:'Label'and the calculator will open.
Mitigation:
The user should update to the latest version of PDF Explorer to ensure that the vulnerability is patched.