Security researchers found 134 vulnerabilities in the way apps such as Adobe Acrobat and Microsoft Word handle JavaScript. Experts developed a tool to help them with the task and called it Cooper, in reference to "Cooperative mutation," a technique employed by the tool.
Of the 134 flaws identified by the app, 59 were considered fit to receive fixes by vendors, 33 received CVE numbers, and 17 yielded a total of $22,000 in bug bounty payments. During the Black Hat Asia conference in Singapore, Chinese Academy of Sciences' Ph.D. student Xu Peng, a co-author of the tool, said that certain apps, such as Word and Acrobat, allow scripting language input.
Xu elaborated that Adobe Acrobat permits PDF manipulation through JavaScript, which requires the document to define native PDF objects and parse JavaScript code. In this situation, Acrobat modules handle the native PDF objects, while a built-in JavaScript engine handles the scripts, and a "binding layer" translates the information.
The "cooperative mutation" technique the tool uses to identify flaws "simultaneously modifies the script code and the related document objects to explore various code paths of the binding code," according to Xu.
According to the project's GitHub page, the tool has three components:
Two of the vulnerabilities Cooper detected, marked as CVE-2021-21028 and CVE-2021-21035, have CVSS severity scores of 8.8 and are both Use After Free Acrobat Reader DC vulnerabilities. These flaws could let an unauthenticated attacker execute arbitrary code remotely. Exploiting these vulnerabilities would require user interaction in that the victim would have to open a malicious file.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsNovember 14, 2024
September 06, 2024