Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2024-4367 #1

Open
hastalamuerte opened this issue May 21, 2024 · 1 comment
Open

2024-4367 #1

hastalamuerte opened this issue May 21, 2024 · 1 comment

Comments

@hastalamuerte
Copy link

Hello i saw your issue - maybe it can be helpfull.
https://github.com/s4vvysec/CVE-2024-4367-POC/blob/main/poc.py
its another POC for same CVE , with ref to https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
there is a lot of schemes url/uri wich can be called in electron and other apps, os.

but cant reproduce ANYTHING in mine env with new versions))

@day0xy
Copy link
Owner

day0xy commented May 22, 2024

Hello i saw your issue - maybe it can be helpfull. https://github.com/s4vvysec/CVE-2024-4367-POC/blob/main/poc.py its another POC for same CVE , with ref to https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/ there is a lot of schemes url/uri wich can be called in electron and other apps, os.

but cant reproduce ANYTHING in mine env with new versions))

Thank you, I've seen all of this before, but I still haven't tried it successfully.
https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/electron-desktop-apps

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants