============================================================================================================================================= | # Title : Adobe Acrobat Chrome V 1.41.100 Extension DOM XSS Exploit | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.2 (64 bits) | | # Vendor : https://chromewebstore.google.com/detail/adobe-acrobat-pdf-edit-co/efaidnbmnnnibpcajpcglclefindmkaj | ============================================================================================================================================= [+] References : https://packetstorm.news/files/id/212491/ [+] Summary : The Adobe Acrobat Chrome extension fails to sanitize JSON-based message parameters rendered in the frame.html file. This creates a DOM-based XSS condition. Malicious payloads are executed inside the extension context. [+] Date: January 2017 Extension: Adobe Acrobat Chrome Extension (ID: efaidnbmnnnibpcajpcglclefindmkaj) Type: DOM-based Cross-Site Scripting (XSS) Users Affected: ~30 million installations (via forced auto-update) [+] Technical Details: The extension receives JSON data and renders dynamic HTML without proper sanitization. The vulnerable code accepts untrusted strings and injects them into the DOM using innerHTML. [+] Impact: An attacker can execute arbitrary JavaScript within the extension context, bypassing browser Same Origin Policy and triggering extension-level privileges. [+] Exploit (PoC): The following sanitized PoC demonstrates the XSS trigger behavior. Steps to Reproduce: 1. Install Adobe Acrobat Chrome Extension. 2. Visit a crafted local HTML page. 3. Observe execution of JavaScript inside the frame context. Save Instructions: Code below should be saved in `poc.html` and opened locally. Execution: Open `poc.html` in Chrome with the extension installed. Observe console logs confirming rendering inside the extension's frame. [+] POC :