Test:
Application |
Version |
OS |
PDF Specification Flaws All exploits are compliant to the PDF Specificiation |
Applications’ Implementation Flaws Attacks improving the stealthiness of EAA and SSA |
||||||||
UI-Layer 1 |
UI-Layer 2 |
UI-Layer 3 |
UI-Layer 1 |
UI-Layer 2 |
UI-Layer 3 |
|||||||
EAA |
SSA |
EAA |
SSA |
EAA |
EAA |
SSA |
EAA |
SSA |
EAA |
|||
Adobe Acrobat Reader DC |
2020.009.20074 |
Windows |
|
|
|
|
|
|
|
|
|
|
Adobe Acrobat Pro 2017 |
2017.011.30171 |
|
|
|
|
|
|
|
|
|
|
|
Expert PDF 14 |
14.0.28.3456 |
|
|
|
|
|
|
|
|
|
|
|
Foxit PhantomPDF |
9.7.1.29511 |
|
|
|
|
|
|
|
|
|
|
|
Foxit Reader |
9.7.1.29511 |
|
|
|
|
|
|
|
|
|
|
|
LibreOffice Draw |
6.4.2.2 |
|
|
|
1 |
|
|
|
|
|
1 |
|
Master PDF Editor |
5.4.38 |
|
|
|
|
|
|
|
|
|
|
|
Nitro Pro |
13.13.2.242 |
|
|
|
|
|
|
|
|
|
|
|
Nitro Reader |
5.5.9.2 |
|
|
|
|
|
|
|
|
|
|
|
PDF Architect |
7.1.14.4969 |
|
|
|
|
|
|
|
|
|
|
|
PDF Editor 6 Pro |
6.5.0.3929 |
2 |
|
2 |
|
2 |
2 |
|
2 |
|
2 |
|
PDFelement Pro |
7.5.1.4782 |
2 |
|
2 |
|
2 |
2 |
|
2 |
|
2 |
|
PDF-XChange Editor |
8.0 (Build 336.0) |
|
|
|
|
|
|
|
|
|
|
|
Perfect PDF 8 Reader |
8.0.3.5 |
|
|
|
|
|
|
|
|
|
|
|
Perfect PDF 10 Premium |
10.0.0.1 |
|
|
|
|
|
|
|
|
|
|
|
Power PDF Standard |
3.10.6687 |
|
|
|
|
|
|
|
|
|
|
|
Soda PDF Desktop |
11.2.46.6035 |
|
|
|
|
|
|
|
|
|
|
|
Adobe Acrobat Reader DC |
2020.009.20074 |
MacOS |
|
|
|
|
|
|
|
|
|
|
Adobe Acrobat Pro 2017 |
2017.011.30171 |
|
|
|
|
|
|
|
|
|
|
|
Foxit PhantomPDF |
3.4.0.1012 |
|
|
|
|
|
|
|
|
|
|
|
Foxit Reader |
3.4.0.1012 |
|
|
|
|
|
|
|
|
|
|
|
LibreOffice Draw |
6.4.2.2 |
|
|
|
|
1 |
|
|
|
|
1 |
|
PDF Editor 6 Pro |
6.5.0.3929 |
2 |
|
2 |
|
2 |
2 |
|
2 |
|
2 |
|
PDFelement Pro |
7.5.9.2925.5460 |
2 |
|
2 |
|
2 |
2 |
|
2 |
|
2 |
|
LibreOffice Draw |
6.4.2.2 |
Linux |
|
|
|
|
1 |
|
|
|
|
1 |
Master PDF Editor |
5.4.38 |
|
|
|
|
|
|
|
|
|
|
|
∑ Applications that are vulnerable , max 26 |
15 |
8 |
11 |
0 |
0 |
18 |
15 |
11 |
9 |
15 |
||
∑ Applications that are limited vulnerability , max 26 |
7 |
3 |
9 |
3 |
3 |
4 |
3 |
9 |
9 |
3 |
||
Vulnerable: Attack is undetectable on the UI Layer. |
1 LibreOffice does not provide a UI-Layer 3 and attacks can, henceforce, not be detected. |
|||||||||||
Limited Vulnerability: Attack is undetectable on the UI Layer but general notification is shown |
2 Every kind of annotation, whether it is allowed or not, leads to an invalid certification. |
|||||||||||
Secure: Attack is clearly detectable on the UI Layer. |
The following applications do not correctly implement permission-level checks. This implementation issue enables the adaption of SSA to P1 certified documents and EAA to P1 and P2 certified documents.
Important: You need to trust the certificate which is used to validate the signature; otherwise, the signature validation in the application will be shown as self-signed.
Legend:
Application | Version | Shadow Hide | Shadow Replace | Shadow Hide-and-Replace |
---|---|---|---|---|
Adobe Acrobat Reader DC | 2019.021.20061 | |||
Adobe Acrobat Pro 2017 | 2017.011.30156 | |||
Expert PDF 14 | 14.0.25.3456 64-bit | (conditional) | (conditional) | (conditional) |
Foxit Reader | 9.7.0.29455 | |||
Foxit PhantomPDF | 9.7.0.29478 | |||
LibreOffice Draw | 6.4.2.2 | (conditional) | ||
Master PDF Editor | 5.4.38, 64 bit | (conditional) | ||
Nitro Pro | 12.16.3.574 | (conditional) | (conditional) | (conditional) |
Nitro Reader | 5.5.9.2 | (conditional) | (conditional) | (conditional) |
PDF Architect | 7 7.0.26.3193 64-bit | (conditional) | (conditional) | (conditional) |
PDF Editor 6 Pro | 6.5.0.3929 | |||
PDFelement | 7.4.0.4670 | |||
PDF-XChange Editor | 8.0 (Build 331.0) | (conditional) | (conditional) | (conditional) |
Perfect PDF Reader | V14.0.9 (29.0) | (conditional) | (conditional) | (conditional) |
Perfect PDF 8 Reader | 8.0.3.5 | |||
Perfect PDF 10 Premium | 10.0.0.1 | |||
Power PDF Standard | 3.0 (Patch-19154.100) | |||
Soda PDF Desktop | 11.1.09.4184 64-bit | (conditional) | (conditional) |
Application | Version | Shadow Hide | Shadow Replace | Shadow Hide-and-Replace |
---|---|---|---|---|
Adobe Acrobat Reader DC | 2019.021.20061 | |||
Adobe Acrobat Pro 2017 | 2017.011.30156 | |||
Foxit Reader | 3.4.0.1012 | |||
Foxit PhantomPDF | 3.4.0.1012 | |||
LibreOffice Draw | 6.4.2.2 | (conditional) | (conditional) | |
Master PDF Editor | 5.4.38, 64 bit | |||
PDF Editor 6 Pro | 6.8.1.3450 | |||
PDFelement | 7.5.7.2895 |
Application | Version | Shadow Hide | Shadow Replace | Shadow Hide-and-Replace |
---|---|---|---|---|
Master PDF Editor | 5.4.38, 64 bit | |||
LibreOffice Draw | 6.4.2.2 | (conditional) | (conditional) |
All bugs have been reported by the CERT-Bund.
Important: You need to trust the certificate which is used to validate the signature; otherwise, the signature validation in the application will be shown as self-signed.
Legend:
Application | Version | USF | ISA | SWA |
---|---|---|---|---|
Adobe Acrobat Reader DC | 2018.011, 2019.008.20080 | (PoC) | ||
Adobe Reader XI | 11.0.10, 11.0.23 | (PoC) | ||
eXpert PDF 12 Ultimate | 12.0.20 | (PoC) | ||
Expert PDF Reader | 9.0.180 | (PoC) | ||
Foxit Reader | 9.1.0, 9.2.0.9297, 9.3.0.10826 | (PoC) | (PoC) | |
LibreOffice (Draw) | 6.0.6.2, 6.1.3.2 | (conditional) (PoC) | ||
Master PDF Editor | 5.1.12, 5.1.68 | (PoC) | ||
Nitro Pro | 11.0.3.173 | (conditional) (PoC) | (PoC) | |
Nitro Reader | 5.5.9.2 | (conditional) (PoC) | (PoC) | |
Nuance Power PDF Standard | 3.0.0.17, 3.0.0.30 | (PoC) | ||
PDF Architect 6 | 6.0.37, 6.1.24.1862 | (PoC) | ||
PDF Editor 6 Pro | 6.4.2.3521 | (conditional) (PoC) | (PoC) | (PoC) |
PDF Experte 9 Ultimate | 9.0.270 | (PoC) | ||
PDFelement6 Pro | 6.8.0.3523, 6.8.4.3921 | (conditional) (PoC) | (PoC) | (PoC) |
PDF Studio Viewer 2018 | 2018.0.1, 2018.2.0 | (PoC) | (PoC) | |
PDF Studio Pro | 12.0.7 | (PoC) | (PoC) | |
PDF-XChange Editor | 7.0.326, 7.0.237.1 | (PoC) | ||
PDF-XChange Viewer | 2.5 | (PoC) | ||
Perfect PDF 10 Premium | 10.0.0.1 | (PoC) | (PoC) | |
Perfect PDF Reader | 13.0.3, 13.1.5 | (PoC) | (PoC) | |
Soda PDF Desktop | 10.2.09, 10.2.16.1217 | (PoC) | ||
Soda PDF | 9.3.17 | (PoC) |
Application | Version | USF | ISA | SWA |
---|---|---|---|---|
Adobe Acrobat Reader DC | 2018.011 | (PoC) | ||
Adobe Reader 9 | 9.5.5 | |||
Foxit Reader | 9.1.0 , 9.2.0 | (PoC) | (PoC) | |
LibreOffice (Draw) | 6.0.3.2 , 6.1.3.2 | (conditional) (PoC) | ||
Master PDF Editor | 5.1.12, 5.1.68 | (PoC) | ||
PDF Studio Viewer 2018 | 2018.0.1, 2018.2.0 | (PoC) | (PoC) | |
PDF Studio Pro | 12.0.7 | (PoC) | (PoC) |
Application | Version | USF | ISA | SWA |
---|---|---|---|---|
Adobe Acrobat Reader DC | 2018.011,2019.008.20080 | (PoC) | ||
Adobe Reader XI | 11.0.10, 11.0.23 | (PoC) | ||
Foxit Reader | 9.1.0 , 9.2.0 | (PoC) | (PoC) | |
LibreOffice (Draw) | 6.1.0.3, 6.1.3.2 | (conditional) (PoC) | ||
Master PDF Editor | 5.1.24, 5.1.68 | (PoC) | ||
PDF Editor 6 Pro | 6.6.2.3315, 6.7.6.3399 | (conditional) (PoC) | (PoC) | (PoC) |
PDFelement6 Pro | 6.7.1.3355, 6.7.6.3399 | (conditional) (PoC) | (PoC) | (PoC) |
PDF Studio Viewer 2018 | 2018.0.1, 2018.2.0 | (PoC) | (PoC) | |
PDF Studio Pro | 12.0.7 | (PoC) | (PoC) |
You can get all Proof-of-Concept exploits in one tar.gz file via the following link.
Please note that we do not provide any exploit, due to the reason that the services are already fixed and thus it would not be possible to test the PoCs against any services.
Legend:
Online Validation Service | Version | USF | ISA | SWA | Fixed |
---|---|---|---|---|---|
DocuSign | v1 REST API with PDFKit.NET 18.3.200.9768 | not fixed yet | |||
eTR Validation Service | v 2.0.3 | ||||
DSS Demonstration WebApp | WebApp 5.2 | not fixed yet | |||
DSS Demonstration WebApp | WebApp 5.4 | ||||
Evotrust | 12.0.20 | not fixed yet | |||
VEP.si | 2017-06-26 | ||||
SiVa Sample Application | release-2.0.1 | - | - | - | - |
As part of our research, we started a responsible disclosure procedure after we identified 21 out of 22 desktop viewer applications vulnerable against at least one of our attacks.
In cooperation with the CERT-Bund, the national CERT section of BSI, we contacted all vendors, provided proof-of-concept exploits, and helped them to fix the issues, and three generic CVEs for each attack class were issued: CVE-2018-16042 (USF), CVE-2018-18688, CVE-2018-18689.