CVE-2021-21798
Nitro Pro vulnerability analysis and mitigation

Overview

An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF, identified as CVE-2021-21798. The vulnerability was discovered and disclosed on September 13, 2021. The affected versions include Nitro Pro 13.31.0.605 and 13.33.2.645. A specially crafted document can trigger this vulnerability when opened by a user, causing a stack variable to go out of scope and resulting in the application dereferencing a stale pointer (Talos Blog, NVD).

Technical details

The vulnerability occurs in the JavaScript implementation of Nitro Pro PDF's document.flattenPages functionality. When a specially crafted document triggers the vulnerability, it causes a stack variable to go out of scope while still being stored within the JSContext. This happens because the implementation of the JSNative 'Document.flattenPages' binding raises a C++ exception, skipping over the code that would normally restore the JSContext.fp field. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).

Impact

If successfully exploited, this vulnerability can lead to code execution under the context of the application. The impact is significant as it allows for complete compromise of the application's security context, potentially enabling an attacker to execute arbitrary code with the same privileges as the Nitro Pro PDF application (Talos Blog).

Mitigation and workarounds

Users are advised to update to the latest version of Nitro Pro PDF. Additionally, the vulnerability can be mitigated by disabling JavaScript in the software's settings. The vendor has worked with Cisco Talos to ensure these issues are resolved and updates are available for affected customers (Talos Blog).

Additional resources


SourceThis report was generated using AI

Related Nitro Pro vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-35288HIGH7.8
  • Nitro ProNitro Pro
  • cpe:2.3:a:gonitro:nitro_pdf_pro
NoYesOct 09, 2024
CVE-2021-21797HIGH7.8
  • Nitro ProNitro Pro
  • cpe:2.3:a:gonitro:nitro_pro
NoYesOct 18, 2021
CVE-2021-21796HIGH7.8
  • Nitro ProNitro Pro
  • cpe:2.3:a:gonitro:nitro_pro
NoYesOct 18, 2021
CVE-2021-21798HIGH7.8
  • Nitro ProNitro Pro
  • cpe:2.3:a:gonitro:nitro_pro
NoYesSep 15, 2021
CVE-2018-18689MEDIUM5.3
  • Foxit PDF ReaderFoxit PDF Reader
  • cpe:2.3:a:foxitsoftware:foxit_reader
NoYesJan 07, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management