Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-0521 PoC — Adobe Reader和Acrobat 信息泄露漏洞

Source
Associated Vulnerability
Title:Adobe Reader和Acrobat 信息泄露漏洞 (CVE-2014-0521)
Description:Adobe Reader和Acrobat都是美国奥多比(Adobe)公司的产品。Adobe Reader是一款免费的PDF文件阅读器,Acrobat是一款PDF文件编辑和转换工具。 基于Windows和OS X平台上的Adobe Reader和Acrobat中存在安全漏洞,该漏洞源于程序没有正确实现JavaScript APIs。远程攻击者可借助特制的PDF文档利用该漏洞获取敏感信息。以下版本受到影响:Adobe Reader 10.1.10之前的10.x版本和11.0.07之前的11.x版本;Adobe
Readme
CVE-2014-0521 Adobe Reader vulnerability
========================================

This JavaScript based Adobe Reader vulnerability affects all versions of Adobe Reader on all platforms prior to version 11.0.07 (released on May 13, 2014). The bug was found by [Gábor Molnár](https://twitter.com/molnar_g) and was reported on March 10, 2014.

Advisories:
 - [CVE-2014-0521](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0521)
 - [Adobe Security Bulletin APSB14-15](http://helpx.adobe.com/security/products/reader/apsb14-15.html)

Presentations:
 - Camp++ 2014 (English): video (soon), slides: [html](http://molnarg.github.io/cve-2014-0521/), [pdf](http://molnarg.github.io/cve-2014-0521/cve-2014-0521.pdf)
 - Ethical Hacking Conference 2014 Hungary (Hungarian): [video](https://www.youtube.com/watch?v=znLBb1e3b3E), [slides](http://molnarg.github.io/cve-2014-0521/js-buvesztrukkok-ethack2014.pdf)

Proof of Concept PDFs:
 - [cve-2014-0521-poc-1.pdf](http://molnarg.github.io/cve-2014-0521/cve-2014-0521-poc-1.pdf): Reading the C:\notes\passwords file and echoing the contents in an alert window.
 - [cve-2014-0521-poc-2.pdf](http://molnarg.github.io/cve-2014-0521/cve-2014-0521-poc-2.pdf): Reading the C:\notes\passwords file and sending the contents to a WebDAV server running on 192.168.56.1:9999 . This uses an undocumented API and is less reliable. For testing I recommend using [PyWebDAV](https://code.google.com/p/pywebdav/), a lightweight WebDAV server.
File Snapshot

[4.0K] /data/pocs/90ac046762cb02907b129cf9a2fecd627e02559a └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.