In WinRAR versions prior to 6.23, there is a vulnerability that allows attackers to execute arbitrary code. This vulnerability occurs when a user tries to open a harmless file within a ZIP archive. The issue arises when the ZIP archive contains a benign file, such as a regular .PDF file, and also a folder with the same name as the benign file. During an attempt to access the benign file, the contents of the folder, which may include executable content, are processed, leading to the execution of arbitrary code.
Foxit PDF Reader, in an oversight, exposes a JavaScript interface capable of writing arbitrary files. This mishap is what makes the software susceptible to attacks. An adversary can manipulate this vulnerability to execute code within the context of the current user, thereby gaining unauthorized control over the system. The vulnerable method is exportXFAData. This exploit will write the agent to the startup folder. This means that the user must logoff and login again in order to execute the agent.