Nitro Pro PDF Reader Javascript API Remote Code Execution Exploit

This module exploits an unsafe Javascript API implemented in Nitro and Nitro Pro PDF Reader. The saveAs() Javascript API function allows for writing arbitrary files to the file system. Additionally, the launchURL() function allows an attacker to execute local files on the file system and bypass the security dialog.
Exploit type: 
Platform: 
Vulnerabilty ID: 
NOCVE-9999-93587
Product Version: 
2017_R2
Released Date: 
Tuesday, August 15, 2017 - 00:00