CVE-2024-4367

Published May 14, 2024

Last updated 4 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2024-4367 is a vulnerability in PDF.js, a JavaScript-based PDF viewer. It stems from a missing type check when handling fonts, specifically during glyph path compilation for Type 1 fonts. The issue occurs in the FontFaceObject.getPathGenerator method, where font matrix values from PDF dictionaries are not properly validated before being used in JavaScript code generation. Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code within the PDF.js context. This could enable malicious actors to perform actions such as spying on user activity, triggering unauthorized downloads (including file:// URLs), and leaking PDF file paths. Web applications that utilize PDF.js may be susceptible to stored Cross-Site Scripting (XSS) attacks. The vulnerability affects Firefox versions prior to 126, Firefox ESR versions earlier than 115.11, and Thunderbird versions before 115.11.

Description
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Source
security@mozilla.org
NVD status
Modified
Products
firefox, thunderbird, debian_linux, open-xchange_appsuite_frontend

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-754

Social media

Hype score
Not currently trending
  1. 🧑‍💻 Arbitrary JavaScript execution in PDF.js [CVE-2024-4367] Blog: https://t.co/Vxfxx2FzTZ #infosec https://t.co/DUZKYucyJQ

    @mqst_

    5 Aug 2025

    7732 Impressions

    35 Retweets

    178 Likes

    66 Bookmarks

    0 Replies

    0 Quotes

  2. 🏁 Arbitrary JavaScript execution in PDF.js [CVE-2024-4367] Blog: https://t.co/Vxfxx2G7Jx #infosec https://t.co/nRe0afEPrf

    @mqst_

    11 Jun 2025

    5073 Impressions

    24 Retweets

    156 Likes

    68 Bookmarks

    0 Replies

    0 Quotes

  3. Top 5 Trending CVEs: 1 - CVE-2024-43405 2 - CVE-2023-45866 3 - CVE-2024-49112 4 - CVE-2024-49113 5 - CVE-2024-4367 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    5 Jan 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 Heads up! CVE-2024-4367 exposes PDF.js to arbitrary JS execution in Firefox &lt;126 &amp; others. Update to v4.2.67+ to stay secure. Read more: https://t.co/guF9UclGSY #CyberSecurity #InfoSec

    @ThreatVector24

    3 Jan 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 New Writeup Alert! 🚨 "PDF.js Arbitrary JavaScript Code Execution (CVE-2024-4367)" by coffinxp is now live on IW! Check it out here: https://t.co/w3ASA58O8L #cve #bugbountytips #bugbounty #bugbountywriteup #pdf

    @InfoSecComm

    3 Jan 2025

    7202 Impressions

    33 Retweets

    162 Likes

    94 Bookmarks

    3 Replies

    1 Quote

  6. PDF.js Arbitrary JavaScript Code Execution (CVE-2024-4367) https://t.co/PNzAAWGxMC #bugbounty #bugbountytips #bugbountytip

    @bountywriteups

    3 Jan 2025

    1270 Impressions

    7 Retweets

    36 Likes

    16 Bookmarks

    0 Replies

    0 Quotes

  7. Awesome! CVE-2024-4367 &amp;#8211; Arbitrary JavaScript execution in PDF.js https://t.co/DTu8aNRGDU

    @r00tth3w0r1d

    28 Oct 2024

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations