You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF
High severity
GitHub Reviewed
Published
May 6, 2024
in
mozilla/pdf.js
•
Updated Jun 10, 2024
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with
isEvalSupported
set totrue
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.Patches
The patch removes the use of
eval
:mozilla/pdf.js#18015
Workarounds
Set the option
isEvalSupported
tofalse
.References
https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
References