Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-4367

Опубликовано: 14 мая 2024
Источник: debian
EPSS Средний

Описание

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed126.0-1package
firefox-esrfixed115.11.0esr-1package
thunderbirdfixed1:115.11.0-1package
odoofixed16.0.0+dfsg.2-3package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4367

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4367

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4367

  • https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/

  • https://github.com/mozilla/pdf.js/discussions/18168

  • https://github.com/odoo/odoo/commit/223d0d57e9ff

EPSS

Процентиль: 97%
0.34475
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 1 года назад

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

CVSS3: 7.5
redhat
около 1 года назад

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

CVSS3: 8.8
nvd
около 1 года назад

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.

CVSS3: 8.8
github
около 1 года назад

PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость библиотеки PDF.js связанная с доступом к ресурсу через несовместимые типы, позволяющая нарушителю выполнить произвольный JavaScript-код

EPSS

Процентиль: 97%
0.34475
Средний