GHSA-wgrm-67xf-hhpq

Suggest an improvement
Source
https://github.com/advisories/GHSA-wgrm-67xf-hhpq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-wgrm-67xf-hhpq/GHSA-wgrm-67xf-hhpq.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wgrm-67xf-hhpq
Aliases
Related
Published
2024-05-07T10:25:08Z
Modified
2024-10-08T07:29:01.883045Z
Summary
PDF.js vulnerable to arbitrary JavaScript execution upon opening a malicious PDF
Details

Impact

If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

Patches

The patch removes the use of eval: https://github.com/mozilla/pdf.js/pull/18015

Workarounds

Set the option isEvalSupported to false.

References

https://bugzilla.mozilla.org/show_bug.cgi?id=1893645

References

Affected packages

npm / pdfjs-dist

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.67

Database specific

{
    "last_known_affected_version_range": "<= 4.1.392"
}