If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported
set to true
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
The patch removes the use of eval
:
https://github.com/mozilla/pdf.js/pull/18015
Set the option isEvalSupported
to false
.
CPE | Name | Operator | Version |
---|---|---|---|
pdfjs-dist | le | 4.1.392 |
bugzilla.mozilla.org/show_bug.cgi?id=1893645
github.com/advisories/GHSA-wgrm-67xf-hhpq
github.com/mozilla/pdf.js/commit/85e64b5c16c9aaef738f421733c12911a441cec6
github.com/mozilla/pdf.js/pull/18015
github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq
lists.debian.org/debian-lts-announce/2024/05/msg00010.html
lists.debian.org/debian-lts-announce/2024/05/msg00012.html
nvd.nist.gov/vuln/detail/CVE-2024-4367
www.mozilla.org/security/advisories/mfsa2024-21
www.mozilla.org/security/advisories/mfsa2024-22
www.mozilla.org/security/advisories/mfsa2024-23