|
Description
|
|
Multiple vulnerabilities have been identified in Adobe Document Server for Reader Extensions, which could be exploited by attackers to disclose sensitive information, execute arbitrary scripting code, or bypass security restrictions.
The first issue is due to missing access control restrictions in the Adobe Document Server for Reader Extensions (ads-readerext), which could be exploited by malicious users to gain access to restricted functionalities by manipulating the "actionID" and "pageID" parameters.
The second flaw is due to an input validation error in the "Update Download Site" section of ads-readerext that does not validate the "ReaderURL" variable, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The third vulnerability is due to input validation errors in "ads-readerext" and "AlterCast" (Adobe Server Web Services) that do not validate the "actionID" and "op" variables, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The fourth issue is due to an error where different error messages are generated depending on whether or not a supplied username exists, which could be exploited by attackers to determine valid usernames.
The fifth flw is due to a design error where a user's session ID for "ads-readerext" is included in the URL as the "jsessionid" parameter and exposed to other web sites in the "Referer:" header.
|