Skip to content

PDF.js Code Execution Vulnerability - 20240522001

Overview

A proof of concept for a High Severity vulnerability in popular PDF viewer PDF.js has been published.

What is vulnerable?

CVE Severity CVSS Product(s) Affected Summary Dated
CVE-2024-4367 High 7.6 versions before Firefox 126; Firefox ESR 115.11; Thunderbird 115.11 A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. 14 May 2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

  • https://www.mozilla.org/security/advisories/mfsa2024-23/
  • https://www.mozilla.org/security/advisories/mfsa2024-22/
  • https://www.mozilla.org/security/advisories/mfsa2024-21/

Additional References

  • https://securityonline.info/researchers-detail-code-execution-vulnerability-in-popular-pdf-viewer-pdf-js/
  • https://www.tenable.com/cve/CVE-2024-4367