In 2019, we published attacks on PDF Signatures and PDF Encryption. During our research and studying the related work, we discovered a lot of blog posts, talks, and papers focusing on malicious PDFs causing some damage. However, there was no systematic analysis of all possible dangerous features supported by PDFs, but only isolated exploits and attack concepts.
We decided to fill this gap and systematize the possibilities to use legitimate PDF features and do bad stuff. We define four attack categories: Denial of Service, Information Disclosure, Data Manipulation, and Code Execution.
Our evaluation reveals 26 of 28 popular PDF processing applications are vulnerable to at least one attack. You can download all malicious PDFs here. You can also find more technical details in our NDSS'21 paper.
This is a joined work of Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk.
Dangerous Paths: Overview
We identified four PDF objects which allow calling arbitrary actions (Page, Annotation, Field, and Catalog). Most objects offer multiple alternatives for this purpose. For example, the Catalog object, defines the OpenAction or additional actions (AA) events. Each event can launch any sequence of PDF actions, for example, Launch, Thread, etc. JavaScript actions can be embedded within documents. It opens a new area for attacks, for example, new annotations can be created that can have actions which once again lead to accessing file handles.
Denial of Service
Infinite Loop
This variant induces an endless loop causing the program execution to get stuck. The PDF standard allows various elements of the document structure to reference to themselves, or to other elements of the same type.
- Action loop: PDF actions allow to specify a Next action to be performed, thereby resulting in "action cycles".
- ObjStm loop: Object streams may extend other object streams allows the crafting of a document with cycles.
- Outline loop: PDF documents may contain an outline. Its entries, however, can refer to themselves or each other.
- Calculations: PDF defines "Type 4" calculator functions, for example, to transform colors. Processing hard-to-solve mathematical formulas may lead to high demands of CPU.
- JavaScript: Finally, in case the PDF application processes scripts within documents, infinite loops can be induced.
Deflate Bomb
Information Disclosure
URL Invocation
PDF documents that silently "phone home" should be considered as privacy-invasive. They can be used, for example, to deanonymize reviewers, journalists, or activists behind a shared mailbox. The attack's goal is to open a backchannel to an attacker-controlled server once the PDF file is opened by the victim.
Form Data Leakage
Local File Leakage
The PDF standard defines various methods to embed external files into a document or otherwise access files on the host's file system, as documented below.
- External streams: Documents can contain stream objects (e.g., images) to be included from external files on disk.
- Reference XObjects: This feature allows a document to import content from another (external) PDF document.
- Open Prepress Interface: Before printing a document, local files can be defined as low-resolution placeholders.
- Forms Data Format (FDF): Interactive form data can be stored in, and auto-imported from, external FDF files.
- JavaScript functions: The Adobe JavaScript reference enables documents to read data from or import local files.
If a malicious document managed to firstly read files from the victim's disk and secondly, send them back to the attacker, such behavior would arguably be critical.
Credential Theft
Data Manipulation
Form Modification
File Write Access
Content Masking
The goal of this attack is to craft a document that renders differently, depending on the applied PDF interpreter. This can be used, for example, to show different content to different reviewers, to trick content filters (AI-based machines as well as human content moderators), plagiarism detection software, or search engines, which index a different text than the one shown to users when opening the document.
- Stream confusion: It is unclear how content streams are parsed if their Length value does not match the offset of the endstream marker, or if syntax errors are introduced.
- Object confusion: An object can overlay another object. The second object may not be processed if it has a duplicate object number, if it is not listed in the XRef table, or if other structural syntax errors are introduced.
- Document confusion: A PDF file can contain yet another document (e.g., as embedded file), multiple XRef tables, etc., which results in ambiguities on the structural level.
- PDF confusion: Objects before the PDF header or after an EOF marker may be processed by implementations, introducing ambiguities in the outer document structure.
Code Execution
Evaluation
Authors of this Post
Christian Mainka
Sources
[2] Aaron Spangler. WinNT/Win95 Automatic Authentication Vulnerability (IE Bug #4). https://insecure.org/sploits/winnt.automatic.authentication.html. Mar. 1997.
[3] Check Point Research. NTLM Credentials Theft via PDF Files. https://research.checkpoint.com/ntlm-credentials-theft-via-pdf-files/. 2018.
More articles
- Pentest Tools Subdomain
- Hacking Tools Free Download
- Hacking Tools Online
- Hack Tools Online
- World No 1 Hacker Software
- Hacker
- Pentest Tools Bluekeep
- Nsa Hack Tools
- Hacker Tool Kit
- Pentest Tools Alternative
- Hack Tools For Ubuntu
- Hacker Tools Free
- Hack Tool Apk No Root
- Hacker Security Tools
- Pentest Tools Online
- Beginner Hacker Tools
- What Are Hacking Tools
- Hacking Tools Software
- Nsa Hacker Tools
- Hack Website Online Tool
- Hacking Tools Online
- Hacking Tools Pc
- Hacker Search Tools
- Bluetooth Hacking Tools Kali
- Computer Hacker
- Hack Tools 2019
- Hackers Toolbox
- Hack Tools Online
- New Hack Tools
- Hacker Tools Online
- Hacking Tools Kit
- Hak5 Tools
- Usb Pentest Tools
- Hacking Tools Software
- Hacker Tools For Mac
- Pentest Tools Tcp Port Scanner
- Hacking Apps
- Pentest Tools Github
- Free Pentest Tools For Windows
- Hack Tools For Mac
- Hacker Tools Apk Download
- Hacking Tools For Games
- Hacking Tools 2020
- Hacking Tools Github
- Pentest Tools Find Subdomains
- Game Hacking
- Hacker
- Pentest Tools Website
- Hack Tools For Ubuntu
- Termux Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Hacker Tools 2020
- Hacker Tools List
- Hacker Tools Online
- Hacking Tools
- Easy Hack Tools
- Pentest Tools Website
- Black Hat Hacker Tools
- Hacking Tools For Windows Free Download
- Beginner Hacker Tools
- Hacking Tools For Pc
- Nsa Hacker Tools
- Pentest Tools For Android
- Hack Tools
- Hacking Tools Name
- Pentest Tools Website Vulnerability
- Hacking Tools Name
- Android Hack Tools Github
- Physical Pentest Tools
- New Hack Tools
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Pentest Tools Find Subdomains
- What Are Hacking Tools
- Hack Tools 2019
- Easy Hack Tools
- Pentest Tools Android
- Blackhat Hacker Tools
- Hacking Tools Mac
- Hacker Tools Software
- Hacking Tools Download
- Pentest Reporting Tools
- Hacker Tools Hardware
- Hack Tools Github
- Top Pentest Tools
- Hacking Tools 2020
- Hacker Tools Mac
- Hacking Tools Windows
- Pentest Tools Website
- Hacker Tools For Ios
- Hackers Toolbox
- Hacks And Tools
- Pentest Tools Android
- Hacking Tools 2019
- Hack And Tools
- Pentest Tools Online
- Pentest Box Tools Download
- Hacker Tools For Pc
- Hak5 Tools
- Hackers Toolbox
- Pentest Tools Apk
- Pentest Tools Review
- Hack Tools For Pc
- Pentest Tools For Android
- Hacker
- Hack Tools Online
- Hack Tools For Games
- Bluetooth Hacking Tools Kali
- Pentest Recon Tools
- Hack Tools For Ubuntu
- Beginner Hacker Tools
- Nsa Hack Tools
- Pentest Tools For Mac
- Pentest Tools Tcp Port Scanner
- Hack Tools For Pc
- Tools Used For Hacking
- Pentest Tools Website
- Hacker Tools 2020
- Nsa Hack Tools
- Hacker Tools Free
- Hack And Tools
- Nsa Hack Tools
- Best Hacking Tools 2019
- Pentest Tools For Mac
- Pentest Tools Github
- Hacker Tools Github
- Hack Tools Online
- Pentest Tools Linux
- Hacker Tools Apk Download
- Pentest Tools For Windows
- Tools 4 Hack
- Hack Tools For Ubuntu
- Pentest Tools Review
- Hacker Tools Linux
- Hacker Techniques Tools And Incident Handling
- Bluetooth Hacking Tools Kali
- Hacking Tools For Kali Linux
- Hak5 Tools
- Hacking Tools Usb
- Android Hack Tools Github
- Pentest Tools Framework
- Install Pentest Tools Ubuntu
- World No 1 Hacker Software
- Hacking Tools For Kali Linux
- Hack Tools For Windows
- Hacking Tools Hardware
- Hacker Tools 2020
- Pentest Tools Review
- Pentest Tools Online
- Pentest Tools Website
- Pentest Tools Nmap
- Hack Apps
- Best Hacking Tools 2019
- How To Make Hacking Tools
- Hack And Tools
- Pentest Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Download
- Hack Tools Pc
- Hacking Tools Usb
- Hacker Tools For Pc
- Hack Website Online Tool
- Pentest Tools For Ubuntu
- Hacking Tools Pc
- Hacker Tools Software
- Hacking Tools For Windows
- Hacker Tools
- Hacking Tools Usb
- Tools Used For Hacking
- Hacking Tools Kit
- Pentest Tools Windows
- Hacker Tools For Mac
- Hacker Hardware Tools
- Hacking Tools For Windows 7
No comments:
Post a Comment