Severity
High
Affected Packages
1
Fixed Packages
1
CVEs
1
Impact
If pdf.js is used to load a malicious PDF, and PDF.js is configured with isEvalSupported
set to true
(which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.
Patches
The patch removes the use of eval
:
https://github.com/mozilla/pdf.js/pull/18015
Workarounds
Set the option isEvalSupported
to false
.
References
Package | Affected Version |
---|---|
![]() |
<= 4.1.392 |
Package | Fixed Version |
---|---|
![]() |
= 4.2.67 |
- ID
- NPM:GHSA-WGRM-67XF-HHPQ
- Severity
- high
- URL
- https://github.com/advisories/GHSA-wgrm-67xf-hhpq
- Published
-
2024-05-07T10:25:08
(2 months ago) - Modified
-
2024-05-07T10:26:15
(2 months ago) - Rights
- NPM Security Team
- Other Advisories
-
-
ALAS2-2024-2561
-
ALSA-2024:2883
-
ALSA-2024:2888
-
ALSA-2024:3783
-
ALSA-2024:3784
-
DSA-5691-1
-
DSA-5693-1
-
ELSA-2024-2881
-
ELSA-2024-2883
-
ELSA-2024-2888
-
ELSA-2024-2913
-
ELSA-2024-3783
-
ELSA-2024-3784
-
FREEBSD:F848EF90-1848-11EF-9850-001B217B3468
-
MFSA-2024-21
-
MFSA-2024-22
-
MFSA-2024-23
-
RHSA-2024:2881
-
RHSA-2024:2883
-
RHSA-2024:2888
-
RHSA-2024:2913
-
RHSA-2024:3783
-
RHSA-2024:3784
-
RLSA-2024:2888
-
RLSA-2024:3783
-
RLSA-2024:3784
-
SSA:2024-135-01
-
SSA:2024-164-01
-
USN-6779-1
-
USN-6782-1
-
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:npm/pdfjs-dist |
![]() |
<= 4.1.392 | ||||
Fixed | pkg:npm/pdfjs-dist |
![]() |
= 4.2.67 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |