Skip to main content

Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution

Medium
Published: Tue Apr 22 2025 (04/22/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution

AI-Powered Analysis

AILast updated: 06/11/2025, 21:10:23 UTC

Technical Analysis

The security threat concerns a vulnerability identified as CVE-2024-4367 affecting Firefox Extended Support Release (ESR) version 115.11, specifically within the PDF.js component. PDF.js is a JavaScript-based PDF renderer integrated into Firefox to display PDF documents natively within the browser. The vulnerability allows arbitrary JavaScript execution through crafted PDF files, enabling an attacker to execute malicious scripts when a user opens a malicious PDF in the vulnerable Firefox ESR version. The exploit leverages the way PDF.js processes certain PDF objects, particularly font matrices and shading patterns, to inject and execute JavaScript code. The provided exploit code is written in Python 3 and generates a malicious PDF file embedding the payload. When this PDF is opened in Firefox ESR 115.11, the arbitrary JavaScript executes within the browser context, potentially leading to unauthorized actions such as data theft, session hijacking, or further exploitation of the host system. The exploit does not require user authentication but does require user interaction in the form of opening the malicious PDF. The vulnerability is remote and can be exploited over the internet by delivering the malicious PDF via email, web downloads, or other file-sharing methods. No official patch links are provided yet, and no known exploits in the wild have been reported at the time of publication. The exploit code is publicly available, increasing the risk of widespread exploitation once weaponized. The vulnerability impacts confidentiality, integrity, and potentially availability depending on the payload executed. Given that Firefox ESR is widely used in enterprise and governmental environments for its stability and extended support, this vulnerability poses a significant risk to organizations relying on this browser version for secure document handling.

Potential Impact

European organizations using Firefox ESR 115.11 are at risk of arbitrary JavaScript execution when opening malicious PDFs, which can lead to data breaches, credential theft, and lateral movement within networks. The ability to execute JavaScript remotely can facilitate drive-by downloads, installation of malware, or exploitation of other browser or system vulnerabilities. This is particularly critical for sectors handling sensitive information such as finance, healthcare, government, and critical infrastructure. The exploit could undermine trust in document handling processes and lead to regulatory non-compliance under GDPR if personal data is compromised. Additionally, the attack vector via PDF files is common and user interaction is often unavoidable, increasing the likelihood of successful exploitation. The lack of a patch and the availability of exploit code heighten the urgency for mitigation. Organizations may face operational disruptions and reputational damage if exploited. The threat also complicates remote work environments where PDF documents are frequently exchanged and viewed.

Mitigation Recommendations

1. Immediate deployment of Firefox ESR versions later than 115.11 once patches are released by Mozilla. Monitor Mozilla security advisories closely for updates. 2. Implement strict email filtering and attachment scanning to detect and quarantine suspicious PDF files, especially those originating from untrusted sources. 3. Disable or restrict PDF.js usage in Firefox ESR via enterprise policies or configure Firefox to open PDFs externally in a dedicated PDF reader that is not vulnerable. 4. Educate users on the risks of opening unsolicited or unexpected PDF attachments and encourage verification of document sources. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous JavaScript execution within browsers. 6. Use sandboxing or virtualization for opening PDF files in isolated environments to prevent lateral movement or system compromise. 7. Regularly audit and update browser configurations and extensions to minimize attack surface. 8. Consider network-level controls to block or monitor PDF file downloads from untrusted or unknown sources. 9. Maintain comprehensive backups and incident response plans to quickly recover from potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52273
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution

# Exploit Title: Firefox ESR 115.11 - Arbitrary JavaScript execution in
PDF.js
# Date: 2025-04-16
# Exploit Author: Milad Karimi (Ex3ptionaL)
# Contact: miladgrayhat@gmail.com
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
# MiRROR-H: https://mirror-h.org/search/hacker/49626/
# Vendor Homepage: https://wordpress.org
# Version: = 115.11
# Tested on: Win, Ubuntu
# CVE : CVE-2024-4367

#!/usr/bin/env python3

import sys

def generate_payload(payload):
    backslash_char = "\\"
    fmt_payload
... (2397 more characters)
Code Length: 2,897 characters

Threat ID: 68489e6e7e6d765d51d546a8

Added to database: 6/10/2025, 9:06:54 PM

Last enriched: 6/11/2025, 9:10:23 PM

Last updated: 7/28/2025, 10:33:54 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats