Vulnerability Name: CVE-2007-0044 (CCN-31266) Assigned: 2007-01-03 Published: 2007-01-03 Updated: 2018-10-16 Summary: Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding." CVSS v3 Severity: 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N )3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-352 Vulnerability Consequences: Gain Access References: Source: CCN Type: Full-Disclosure Mailing List, Wed Jan 03 2007 - 11:22:49 CSTAdobe Acrobat Reader Plugin - Multiple Vulnerabilities Source: MITRE Type: CNACVE-2007-0044 Source: MISC Type: UNKNOWNhttp://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf Source: SUSE Type: UNKNOWNSUSE-SA:2007:011 Source: CCN Type: RHSA-2008-0144Critical: acroread security update Source: SECUNIA Type: UNKNOWN23812 Source: SECUNIA Type: Vendor Advisory23882 Source: SECUNIA Type: Vendor Advisory29065 Source: GENTOO Type: UNKNOWNGLSA-200701-16 Source: SREASON Type: Vendor Advisory2090 Source: CCN Type: SECTRACK ID: 1017469Adobe Acrobat Reader Plugin Bugs Let Remote Users Deny Service, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1017469 Source: CCN Type: ASA-2008-092acroread security update (RHSA-2008-0144) Source: CCN Type: Adobe Acrobat Reader Plugin Web siteAdobe - Reader Source: CCN Type: GLSA-200701-16Adobe Acrobat Reader: Multiple vulnerabilities Source: REDHAT Type: UNKNOWNRHSA-2008:0144 Source: BUGTRAQ Type: UNKNOWN20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities Source: BID Type: UNKNOWN21858 Source: CCN Type: BID-21858Adobe Reader Plugin Open Parameters Cross-Site Scripting Vulnerability Source: VUPEN Type: UNKNOWNADV-2007-0032 Source: MISC Type: Exploit, Patchhttp://www.wisec.it/vulns.php?page=9 Source: XF Type: UNKNOWNadobe-acrobat-pdf-csrf(31266) Source: XF Type: UNKNOWNadobe-acrobat-pdf-csrf(31266) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10042 Source: SUSE Type: SUSE-SA:2007:011Acrobat Reader 7.0.9 update Vulnerable Configuration: Configuration 1 :cpe:/a:adobe:acrobat:7.0:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:*:*:elements:*:*:*:*:* (Version <= 7.0.8) OR cpe:/a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:* OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:*:*:*:*:*:*:*:* (Version <= 7.0.8) Configuration RedHat 1 :cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* Configuration RedHat 3 :cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_3d:*:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.1::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.2::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.3::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.4::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.5::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.6::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.7::professional:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8::standard:*:*:*:*:* OR cpe:/a:adobe:acrobat:7.0.8::professional:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:* OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20070044 V CVE-2007-0044 2015-11-16 oval:org.mitre.oval:def:22416 P ELSA-2008:0144: acroread security update (Critical) 2014-05-26 oval:org.mitre.oval:def:10042 V Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding." 2010-09-06 oval:com.redhat.rhsa:def:20080144 P RHSA-2008:0144: acroread security update (Critical) 2008-03-20
BACK
adobe acrobat 7.0
adobe acrobat 7.0
adobe acrobat 7.0.1
adobe acrobat 7.0.1
adobe acrobat 7.0.2
adobe acrobat 7.0.2
adobe acrobat 7.0.3
adobe acrobat 7.0.3
adobe acrobat 7.0.4
adobe acrobat 7.0.4
adobe acrobat 7.0.5
adobe acrobat 7.0.5
adobe acrobat 7.0.6
adobe acrobat 7.0.6
adobe acrobat 7.0.7
adobe acrobat 7.0.7
adobe acrobat *
adobe acrobat 7.0.8
adobe acrobat 7.0.8
adobe acrobat 3d *
adobe acrobat reader 6.0
adobe acrobat reader 6.0.1
adobe acrobat reader 6.0.2
adobe acrobat reader 6.0.3
adobe acrobat reader 6.0.4
adobe acrobat reader 6.0.5
adobe acrobat reader 7.0
adobe acrobat reader 7.0.1
adobe acrobat reader 7.0.2
adobe acrobat reader 7.0.3
adobe acrobat reader 7.0.4
adobe acrobat reader 7.0.5
adobe acrobat reader 7.0.6
adobe acrobat reader 7.0.7
adobe acrobat reader *
adobe acrobat reader 6.0.1
adobe acrobat reader 6.0
adobe acrobat reader 6.0.2
adobe acrobat reader 7.0
adobe acrobat reader 7.0.1
adobe acrobat reader 7.0.2
adobe acrobat 3d *
adobe acrobat reader 6.0.3
adobe acrobat reader 6.0.4
adobe acrobat reader 6.0.5
adobe acrobat reader 7.0.3
adobe acrobat reader 7.0.4
adobe acrobat reader 7.0.5
adobe acrobat reader 7.0.6
adobe acrobat reader 7.0.7
adobe acrobat reader 7.0.8
adobe acrobat 7.0
adobe acrobat 7.0
adobe acrobat 7.0.1
adobe acrobat 7.0.1
adobe acrobat 7.0.2
adobe acrobat 7.0.2
adobe acrobat 7.0.3
adobe acrobat 7.0.3
adobe acrobat 7.0.4
adobe acrobat 7.0.4
adobe acrobat 7.0.5
adobe acrobat 7.0.5
adobe acrobat 7.0.6
adobe acrobat 7.0.6
adobe acrobat 7.0.7
adobe acrobat 7.0.7
adobe acrobat 7.0.8
adobe acrobat 7.0.8
gentoo linux *
suse linux enterprise server 8
novell linux desktop 9
suse suse linux 10.0
redhat rhel extras 3
redhat rhel extras 4
suse suse linux 10.1
novell opensuse 10.2
suse suse linux 9.3