Skip to content

LOURC0D3/CVE-2024-4367-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-4367 & CVE-2024-34342: Arbitrary JavaScript execution in PDF.js

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

  • JS Execution
python3 CVE-2024-4367.py "alert(document.domain)"

PoC_JS

  • OS Command Execution (only Electron based)
python3 CVE-2024-4367.py "require('child_process').exec('open -a /Applications/Calculator.app');"

PoC_OS

This is not my bug, I just made a PoC for it.

Reference

About

CVE-2024-4367 & CVE-2024-34342 Proof of Concept

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages