CVE-2022-30350

7.5 HIGH

📋 TL;DR

CVE-2022-30350 is an information disclosure vulnerability in Avanquest Software RAD PDF (PDFEscape Online) where the 'white out' redaction feature fails to properly remove underlying content from PDF documents. This allows users to copy-paste supposedly redacted text using standard PDF readers. Organizations and individuals using PDFEscape Online for document redaction are affected.

💻 Affected Systems

Products:
  • Avanquest Software RAD PDF (PDFEscape Online)
Versions: 3.19.2.2 and likely earlier versions
Operating Systems: Windows, Web-based
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web-based PDFEscape Online tool at pdfescape.com/open/ and potentially in the desktop version. The redaction feature is part of the standard functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information (legal documents, financial records, personal data) that was believed to be redacted becomes fully accessible, leading to data breaches, regulatory violations, and reputational damage.

🟠

Likely Case

Users inadvertently expose confidential information by relying on the flawed redaction feature, with the redacted content being extractable by recipients using common PDF software.

🟢

If Mitigated

If proper document security controls are implemented (like proper redaction tools or encryption), the impact is limited to users who exclusively rely on PDFEscape Online's redaction feature.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a user to create a redacted PDF using the vulnerable tool, then any recipient can extract the redacted content using standard PDF software like Adobe Reader by simply copy-pasting. The arXiv paper provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Check for updates from Avanquest Software. 2. If an updated version is available, install it. 3. Recreate any redacted PDFs using the patched version.

🔧 Temporary Workarounds

Use alternative redaction tools

all

Replace PDFEscape Online with properly validated PDF redaction software that permanently removes content.

Convert redacted PDFs to images

all

After redaction in PDFEscape Online, convert the PDF to an image format (like PNG) to prevent text extraction.

🧯 If You Can't Patch

  • Immediately stop using PDFEscape Online for redacting sensitive documents
  • Audit and re-redact any previously redacted PDFs using secure methods

🔍 How to Verify

Check if Vulnerable:

Create a test PDF with text, use PDFEscape Online's 'white out' feature to redact it, then try to copy-paste the redacted area in Adobe Reader or similar. If text is copied, the system is vulnerable.

Check Version:

For web version: check the website footer. For desktop: check Help > About or program properties.

Verify Fix Applied:

Repeat the vulnerable check with the updated version. If redacted text cannot be copied, the fix is effective.

📡 Detection & Monitoring

Log Indicators:

  • No specific log indicators as this is a client-side tool vulnerability

Network Indicators:

  • No network-based detection as exploitation occurs locally

SIEM Query:

Not applicable for this client-side vulnerability

🔗 References

📤 Share & Export