CVE-2023-39542
📋 TL;DR
This vulnerability in Foxit Reader's JavaScript saveAs API allows arbitrary file creation when a user opens a malicious PDF file or visits a malicious website with the browser plugin enabled. Successful exploitation can lead to remote code execution on the victim's system. All users of Foxit Reader 12.1.3.15356 are affected.
💻 Affected Systems
- Foxit Reader
📦 What is this software?
Foxit Reader by Foxitsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control over the victim's machine, data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local file system manipulation leading to malware installation, credential theft, or persistence mechanisms being established on the compromised system.
If Mitigated
Limited impact with proper application sandboxing, file system restrictions, and user awareness preventing malicious file execution.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file or visiting malicious site). No authentication required for the vulnerability itself.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 12.2.0 or later
Vendor Advisory: https://www.foxit.com/support/security-bulletins.html
Restart Required: Yes
Instructions:
1. Download latest Foxit Reader from official website. 2. Run installer. 3. Restart system. 4. Verify version is 12.2.0 or higher.
🔧 Temporary Workarounds
Disable JavaScript in Foxit Reader
allPrevents JavaScript execution in PDF files, mitigating the vulnerability
Open Foxit Reader > File > Preferences > Trust Manager > Uncheck 'Enable JavaScript'
Disable Browser Plugin
allPrevents web-based exploitation through malicious websites
Browser settings > Extensions/Add-ons > Disable Foxit Reader plugin
🧯 If You Can't Patch
- Use alternative PDF reader software
- Implement application whitelisting to block Foxit Reader execution
🔍 How to Verify
Check if Vulnerable:
Check Foxit Reader version in Help > About. If version is 12.1.3.15356, system is vulnerable.
Check Version:
On Windows: wmic product where name="Foxit Reader" get version
Verify Fix Applied:
Verify version is 12.2.0 or higher in Help > About. Test with known safe PDF files containing JavaScript.
📡 Detection & Monitoring
Log Indicators:
- Unusual file creation events in system logs
- Foxit Reader process spawning unexpected child processes
- JavaScript execution errors in application logs
Network Indicators:
- Unexpected outbound connections from Foxit Reader process
- Downloads of suspicious PDF files
SIEM Query:
process_name:"FoxitReader.exe" AND (child_process:* OR file_create:* OR network_connection:*)