关联漏洞
描述
CVE-2024-4367 & CVE-2024-34342 Proof of Concept
介绍
# CVE-2024-4367 & CVE-2024-34342: Arbitrary JavaScript execution in PDF.js
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
- JS Execution
```
python3 CVE-2024-4367.py "alert(document.domain)"
```

- OS Command Execution (only Electron based)
```
python3 CVE-2024-4367.py "require('child_process').exec('open -a /Applications/Calculator.app');"
```

This is not my bug, I just made a PoC for it.
# Reference
- https://github.com/advisories/GHSA-wgrm-67xf-hhpq
- https://nvd.nist.gov/vuln/detail/CVE-2024-4367
文件快照
[4.0K] /data/pocs/ff08829e0ec8e7c1a34772a7a64f86f41a59d703
├── [2.4K] CVE-2024-4367.py
├── [ 970] README.md
├── [800K] result_js.png
└── [357K] result_os.png
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。