CVE-2024-4367
ADVISORY - githubSummary
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported
set to true
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
Patches
The patch removes the use of eval
:
https://github.com/mozilla/pdf.js/pull/18015
Workarounds
Set the option isEvalSupported
to false
.
References
EPSS Score: 0.00086 (0.392)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - gitlab
ADVISORY - redhat
Improper Check for Unusual or Exceptional Conditions
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in