Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21608 PoC — Adobe Acrobat Reader 资源管理错误漏洞

Source
Associated Vulnerability
Title:Adobe Acrobat Reader 资源管理错误漏洞 (CVE-2023-21608)
Description:Adobe Acrobat Reader是美国奥多比(Adobe)公司的一款PDF查看器。该软件用于打印,签名和注释 PDF。 Adobe Acrobat Reader 22.003.20282(及更早版本)、22.003.20281(及更早版本)和 20.005.30418(及更早版本)存在资源管理错误漏洞,该漏洞源于受释放后重用漏洞影响,该漏洞可能导致在当前用户的上下文中执行任意代码。 利用此问题需要用户交互,因为受害者必须打开恶意文件。
Description
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Readme
# CVE-2023-21608

[![Twitter Follow](https://img.shields.io/twitter/follow/HackSysTeam?style=social)](https://twitter.com/HackSysTeam)
[![Mastodon Follow](https://img.shields.io/mastodon/follow/109291325205105061?domain=https%3A%2F%2Finfosec.exchange&style=social)](https://infosec.exchange/@hacksysteam)
[![Discord Server](https://dcbadge.vercel.app/api/server/ns32uNhaq7?style=flat)](https://discord.com/invite/ns32uNhaq7)

This bug was `Use after Free` which was caused during `resetForm` operation while handling object memory references.

## Blog

-   [Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit - CVE-2023-21608](https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608)

## Advisory

-   [CVE-2023-21608](https://hacksys.io/advisories/HI-2022-006)

## Demo

[![Adobe Acrobat Reader DC - UaF - Remote Code Execution - CVE-2023-21608](https://img.youtube.com/vi/cguBkC0opXk/0.jpg)](https://www.youtube.com/watch?v=cguBkC0opXk)
File Snapshot

[4.0K] /data/pocs/9eb8f3f7428f00ad3d2010fb10329a635d9f0e27 ├── [1.1K] crash.js ├── [2.8K] crash.pdf ├── [ 11K] exploit.js ├── [ 13K] exploit.pdf ├── [ 34K] LICENSE └── [ 962] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.