Adobe 22002486 Digital Signature User Guide - Page 135

Examples of Prevented Behavior, Examples of Allowed Behavior

Page 135 highlights

Acrobat 9 Family of Products Security Feature User Guide External Content and Document Security Changes in FDF Behavior 135 Table 17 Rules for opening a PDF via FDF Action FDF PDF location location Data injection n/a n/a 8.x behavior Allowed Data injection server browser Allowed Data injection server Acrobat/ Reader Allowed Data injection Script injection Varied Any Varied Any Allowed Allowed 9.x behavior Allowed if:  Data retuned via a form submit with url#FDF.  FDF has no /FDF key.  cross-domain policy permits it. Allowed if:  Link to PDF contains #FDF=url.  FDF has no /FDF key.  x-domain policy permits it. Allowed if:  PDF makes EFS POST/GET and FDF sends data in https response to same PDF.  x-domain policy permits it. Authorization required if enhanced security is on and document is not set as a privileged location. Injection is blocked unless if enhanced security is on and FDF is not in a privileged location. Examples of Prevented Behavior The following are examples of disallowed actions when Enhanced Security is on:  If the PDF opens in the browser, and the URL to the PDF contains a #FDF=url, then the FDF data specified by that url may be injected into the open PDF if the FDF has no /F key and if the PDF may receive data from the FDF based on the cross domain policy.  If the PDF opens in the Acrobat/Reader standalone application and the FDF data comes back in the https response to a POST/GET initiated by the PDF, then the FDF data may be injected into the open PDF if the PDF specified in the FDF is the PDF that made the POST/GET and if the PDF may receive data from the FDF based on the crossdomain policy (i.e. * in crossdomain.xml). Examples of Allowed Behavior The following are examples of scenarios where FDF data injection does need a user-authorization dialog when Enhanced Security is on:  You submit data from a PDF in the browser and the URL has #FDF at the end. The FDF that comes back has an /F key pointing to a different PDF which needs to get loaded (everything is happening in the browser). The FDF data gets injected into the second PDF.  Same as above, except it all happens in the Acrobat rather than in the browser. In this case, the #FDF at the end of the URL is not needed.  The "spontaneous FDF" case: In the browser, an unsolicited FDF arrives (via a link from an HTML page before and Acrobat is not running yet), and the FDF has an /F key for a PDF that it needs to open and populate.  Opening a link of the form http://A.com/file.pdf#FDF=http://B.com/getFDF.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

Acrobat 9 Family of Products
External Content and Document Security
Security Feature User Guide
Changes in FDF Behavior
135
Examples of Prevented Behavior
The following are examples of disallowed actions when Enhanced Security is on:
If the PDF opens in the browser, and the URL to the PDF contains a #FDF=url, then the FDF data
specified by that url may be injected into the open PDF if the FDF has no /F key and if the PDF may
receive data from the FDF based on the cross domain policy.
If the PDF opens in the Acrobat/Reader standalone application and the FDF data comes back in the
https response to a POST/GET initiated by the PDF, then the FDF data may be injected into the open
PDF if the PDF specified in the FDF is the PDF that made the POST/GET and if the PDF may receive data
from the FDF based on the crossdomain policy (i.e. * in crossdomain.xml).
Examples of Allowed Behavior
The following are examples of scenarios where FDF data injection does need a user-authorization dialog
when Enhanced Security is on:
You submit data from a PDF in the browser and the URL has #FDF at the end. The FDF that comes back
has an /F key pointing to a different PDF which needs to get loaded (everything is happening in the
browser). The FDF data gets injected into the second PDF.
Same as above, except it all happens in the Acrobat rather than in the browser. In this case, the #FDF at
the end of the URL is not needed.
The "spontaneous FDF" case: In the browser, an unsolicited FDF arrives (via a link from an HTML page
before and Acrobat is not running yet), and the FDF has an /F key for a PDF that it needs to open and
populate.
Opening a link of the form http://A.com/file.pdf#FDF=http://B.com/getFDF.
Data injection
n/a
n/a
Allowed
Allowed if:
Data retuned via a form submit with
url#FDF.
FDF has no /FDF key.
cross-domain policy permits it.
Data injection
server
browser
Allowed
Allowed if:
Link to PDF contains #FDF=url.
FDF has no /FDF key.
x-domain policy permits it.
Data injection
server
Acrobat/
Reader
Allowed
Allowed if:
PDF makes EFS POST/GET and FDF sends
data in https response to same PDF.
x-domain policy permits it.
Data injection
Varied
Varied
Allowed
Authorization required if enhanced security is on and
document is not set as a privileged location.
Script injection
Any
Any
Allowed
Injection is blocked unless if enhanced security is on
and FDF is not in a privileged location.
Table 17
Rules for opening a PDF via FDF
Action
FDF
location
PDF
location
8.x behavior
9.x behavior