TippingPoint Zero Day Initiative

Adobe RoboHelp Server Arbitrary File Upload and Execute Vulnerability

ZDI-09-066: September 23rd, 2009


Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 8527. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of Adobe RoboHelp Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists in the management web server listening by default on port 8080. The Java Servlet handling POST requests to the server does not properly sanitize user input. A specially crafted request can bypass authentication allowing an attacker to upload and execute arbitrary files. Successful exploitation can result in complete system compromise under SYSTEM credentials.

Vendor Response

Adobe has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2009-06-26 - Vulnerability reported to vendor
    2009-09-23 - Coordinated public release of advisory


This vulnerability was discovered by:
    Stephen Fewer of Harmony Security (www.harmonysecurity.com)