Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
BID:17500
Info
Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
| Bugtraq ID: | 17500 |
| Class: | Unknown |
| CVE: |
CVE-2006-1627 CVE-2006-1785 CVE-2006-1786 CVE-2006-1787 CVE-2006-1788 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 13 2006 12:00AM |
| Updated: | Jul 06 2016 02:40PM |
| Credit: | Discovered by Tan Chew Keong and Carsten Eiram, Secunia Research. |
| Vulnerable: |
Adobe Graphics Server 2.1 Adobe Document Server 6.0 |
| Not Vulnerable: | |
Discussion
Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
Adobe Document Server for Reader Extensions, included with Graphics Server and Document Server, is prone to multiple vulnerabilities that may allow remote attackers to:
- perform cross-site scripting attacks
- gain access to potentially sensitive information
- bypass security restrictions to gain administrative access to the application.
Adobe Document Server for Reader Extensions version 6.0, included with Adobe Graphics Server 2.1 and Adobe Document Server 6.0, is vulnerable; other versions may also be affected.
Adobe Document Server for Reader Extensions, included with Graphics Server and Document Server, is prone to multiple vulnerabilities that may allow remote attackers to:
- perform cross-site scripting attacks
- gain access to potentially sensitive information
- bypass security restrictions to gain administrative access to the application.
Adobe Document Server for Reader Extensions version 6.0, included with Adobe Graphics Server 2.1 and Adobe Document Server 6.0, is vulnerable; other versions may also be affected.
Exploit / POC
Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
These issues may be exploited with a web browser.
Example URIs have been provided to demonstrate the cross-site scripting vulnerabilities:
http://www.example.com:8019/ads-readerext/ads-readerext?actionID=[code]
http://www.example.com:8019/altercast/AlterCast?op=[code]
These issues may be exploited with a web browser.
Example URIs have been provided to demonstrate the cross-site scripting vulnerabilities:
http://www.example.com:8019/ads-readerext/ads-readerext?actionID=[code]
http://www.example.com:8019/altercast/AlterCast?op=[code]
Solution / Fix
Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
Solution:
Adobe has released advisories and updated software to address these issues. Please see the referenced advisories for further information.
Solution:
Adobe has released advisories and updated software to address these issues. Please see the referenced advisories for further information.
References
Adobe Document Server for Reader Extensions Multiple Remote Vulnerabilities
References:
References:
- Adobe Document Server for Reader Extensions 6.0 session ID parameter is exposed (Adobe)
- Adobe Homepage (Adobe)
- Security Advisory: Adobe Document Server for Reader Extensions authentication vu (Adobe)
- User authentication changes for Adobe Document Server for Reader Extensions 6.0 (Adobe)
- Secunia Research: Adobe Document Server for Reader Extensions Multiple Vulnerabi (Secunia Research