Arbitrary JavaScript Execution Vulnerability in Firefox

CVE-2024-4367

Currently unrated 🤨

Key Information

Vendor
Mozilla
Status
Firefox
Firefox Esr
Thunderbird
Vendor
CVE Published:
14 May 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

What is CVE-2024-4367?

CVE-2024-4367 is a vulnerability identified in the Mozilla Firefox browser, particularly affecting versions prior to 126, as well as Firefox Extended Support Release (ESR) versions below 115.11 and Thunderbird versions below 115.11. This vulnerability involves a flaw in the handling of fonts within PDF.js, which can lead to arbitrary JavaScript execution in the context of PDF documents. The ability to execute arbitrary JavaScript can have severe consequences for organizations, as it could enable attackers to manipulate web content, conduct phishing attacks, or deploy malware directly within users’ browsers, compromising sensitive information and disrupting business operations.

Technical Details

The root cause of CVE-2024-4367 lies in a type check that was not implemented when the browser processed fonts through PDF.js, a library used to render PDF files in web applications. This oversight allows maliciously crafted PDF files to execute JavaScript code within the browser environment, which can be exploited to bypass security restrictions and enable further attacks. Given the widespread usage of PDF documents in professional correspondence and documentation, this vulnerability poses a significant risk to users who open such files through affected versions of Firefox or Thunderbird.

Impact of the Vulnerability

  1. Arbitrary Code Execution: The vulnerability allows attackers to execute arbitrary JavaScript within the context of the PDF document, potentially leading to further exploits, data exfiltration, or system compromise.

  2. Data Breaches: If exploited successfully, this vulnerability could facilitate unauthorized access to sensitive information stored within the browser or affect user sessions, leading to potential data breaches.

  3. Widespread Exploitation Risk: Given that the vulnerability has been confirmed as being exploited in the wild, organizations are at risk of falling victim to targeted attacks leveraging malicious PDFs, emphasizing the need for immediate attention to patching and mitigation strategies.

Affected Version(s)

Firefox < 126

Firefox ESR < 115.11

Thunderbird < 115.11

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Firefox用於存取PDF檔案的元件存在弱點,有可能被用於執行任意JavaScript程式碼

上週研究人員對於Mozilla基金會在Firefox 126修補的PDF.js漏洞CVE-2024-4367提出說明,並指出這項漏洞與字型處理有關,攻擊者有機會用來執行任意JavaScript程式碼

7 months ago

PoC Released for JavaScript execution Vulnerability in PDF.js

A vulnerability, identified as CVE-2024-4367, PDF.js, was discovered in a widely used JavaScript-based PDF viewer maintained by Mozilla.

7 months ago

Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox

Researchers uncover critical security flaws in two widely used software packages, llama_cpp_python for AI models and PDF.js used by the Firefox.

7 months ago

Refferences

Timeline

  • 🔴

    Public PoC available

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot

  • 👾

    Exploit known to exist

  • Vulnerability started trending

  • Vulnerability published

  • First article discovered by GBHackers on Security

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database3 Proof of Concept(s)7 News Article(s)

Credit

Thomas Rinsma of Codean Labs
.