CVE-2024-4367
PDF.js < 4.2.67 - Arbitrary JavaScript Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
14Exploited in Wild
-Decision
Descriptions
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Faltaba una verificación de tipo al manejar fuentes en PDF.js, lo que permitiría la ejecución arbitraria de JavaScript en el contexto de PDF.js. Esta vulnerabilidad afecta a Firefox < 126, Firefox ESR < 115.11 y Thunderbird < 115.11.
A flaw was found in Mozilla. The Mozilla Foundation Security Advisory describes this flaw as follows: A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context.
PDF.js is vulnerable to Arbitrary JavaScript Execution in versions prior to 4.2.67. This is due to a missing type check when handling fonts. This makes it possible for authenticated attackers, with contributor-level or above permissions, to execute arbitrary JavaScript if they can successfully trick a user into opening a crafted PDF file.
USN-6779-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Jan-Ivar Bruaroey discovered that Firefox did not properly manage memory when audio input connected with multiple consumers. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. Thomas Rinsma discovered that Firefox did not properly handle type check when handling fonts in PDF.js. An attacker could potentially exploit this issue to execute arbitrary javascript code in PDF.js. Irvan Kurniawan discovered that Firefox did not properly handle certain font styles when saving a page to PDF. An attacker could potentially exploit this issue to cause a denial of service.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-30 CVE Reserved
- 2024-05-14 CVE Published
- 2024-05-20 First Exploit
- 2025-03-28 CVE Updated
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (22)
URL | Date | SRC |
---|---|---|
https://github.com/snyk-labs/pdfjs-vuln-demo | 2024-06-12 | |
https://github.com/clarkio/pdfjs-vuln-demo | 2024-06-12 | |
https://github.com/LOURC0D3/CVE-2024-4367-PoC | 2024-06-07 | |
https://github.com/s4vvysec/CVE-2024-4367-POC | 2024-05-20 | |
https://github.com/Scivous/CVE-2024-4367-npm | 2024-06-21 | |
https://github.com/Masamuneee/CVE-2024-4367-Analysis | 2024-09-04 | |
https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample | 2024-11-07 | |
https://github.com/spaceraccoon/detect-cve-2024-4367 | 2024-09-07 | |
https://github.com/avalahEE/pdfjs_disable_eval | 2024-05-27 | |
https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed | 2024-12-01 | |
https://github.com/UnHackerEnCapital/PDFernetRemotelo | 2024-11-20 | |
https://github.com/exfil0/WEAPONIZING-CVE-2024-4367 | 2025-01-05 | |
https://github.com/inpentest/CVE-2024-4367-PoC | 2025-02-20 | |
https://github.com/elamani-drawing/CVE-2024-4367-POC-PDFJS | 2025-03-25 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-4367 | 2024-06-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2280382 | 2024-06-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bsk Pdf Manager Search vendor "Bsk Pdf Manager" | Bsk Pdf Manager Search vendor "Bsk Pdf Manager" for product "Bsk Pdf Manager" | >= 0.0 <= 3.6 Search vendor "Bsk Pdf Manager" for product "Bsk Pdf Manager" and version " >= 0.0 <= 3.6" | en |
Affected
|