cve/2024/CVE-2024-4367.md
2025-09-29 16:08:36 +00:00

60 lines
2.9 KiB
Markdown

### [CVE-2024-4367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20115.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20126%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20JavaScript%20execution%20in%20PDF.js&color=brighgreen)
### Description
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
#### Github
- https://github.com/0xr2r/CVE-2024-4367
- https://github.com/1337rokudenashi/Odoo_PDFjs_CVE-2024-4367.pdf
- https://github.com/AazafRitha/bug-bounty-reports
- https://github.com/BektiHandoyo/cve-pdf-host
- https://github.com/Bhavyakcwestern/Hacking-pdf.js-vulnerability
- https://github.com/GhostTroops/TOP
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/LOURC0D3/CVE-2024-4367-PoC
- https://github.com/Masamuneee/CVE-2024-4367-Analysis
- https://github.com/MihranGIT/POC_CVE-2024-4367
- https://github.com/PenguinCabinet/CVE-2024-4367-hands-on
- https://github.com/Scivous/CVE-2024-4367-npm
- https://github.com/Threekiii/Awesome-POC
- https://github.com/UnHackerEnCapital/PDFernetRemotelo
- https://github.com/VVeakee/CVE-2024-4367
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed
- https://github.com/alecdhuse/Lantern-Shark
- https://github.com/avalahEE/pdfjs_disable_eval
- https://github.com/clarkio/pdfjs-vuln-demo
- https://github.com/elamani-drawing/CVE-2024-4367-POC-PDFJS
- https://github.com/exfil0/WEAPONIZING-CVE-2024-4367
- https://github.com/google/fishy-pdf
- https://github.com/hellomipl/mipl-pdf-viewer
- https://github.com/kabiri-labs/CVE-2024-4367-PoC
- https://github.com/klausnitzer/pentest-pdf-collection
- https://github.com/m0d0ri205/PDFJS
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pS3ud0RAnD0m/cve-2024-4367-poc
- https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/rjm521/hdfs-dashboard
- https://github.com/romanbelaire/notebook
- https://github.com/rzte/pdf-exploit
- https://github.com/s4vvysec/CVE-2024-4367-POC
- https://github.com/snyk-labs/pdfjs-vuln-demo
- https://github.com/spaceraccoon/detect-cve-2024-4367
- https://github.com/tanjiti/sec_profile
- https://github.com/zgimszhd61/openai-sec-test-cve-quickstart
- https://github.com/zulloper/cve-poc