Closed
Bug 1906543
Opened 1 year ago
Closed 1 year ago
Cross-Site Scripting (XSS) vulnerability in Firefox's PDF Viewer
Categories
(Firefox :: Security, defect)
Firefox
Security
Tracking
()
RESOLVED
INVALID
People
(Reporter: ranjanyadav2003, Unassigned)
Details
(Keywords: reporter-external, Whiteboard: [client-bounty-form])
Attachments
(1 file)
|
94.85 KB,
application/pdf
|
Details |
Vulnerability Details
Description: XSS vulnerability observed when opening a PDF file in Firefox.
Impact: Potential for malicious script execution within the browser context.
Steps to Reproduce
Environment Setup:
Operating System: windows 11
Browser: Firefox 127.0.2 (64-bit)
Reproduction Steps:
Open Firefox.
1.open the provided attached file
2. Observe XSS payload execution [ when you open the file in firefox xss poped up].
-
Proof of Concept (PoC)
Payload: Include the specific XSS payload used for demonstration.
Screenshot/Video: Attach screenshots or a video demonstrating the XSS behavior.
Flags: sec-bounty?
Comment 1•1 year ago
|
||
There is no cross-site scripting here: the script is sandboxed in the PDF context.
https://blog.mozilla.org/attack-and-defense/2021/10/14/implementing-form-filling-and-accessibility-in-the-firefox-pdf-viewer/
https://textslashplain.com/2024/04/10/browser-security-bugs-that-arent-javascript-in-pdf/
Group: firefox-core-security
Status: UNCONFIRMED → RESOLVED
Closed: 1 year ago
Flags: sec-bounty? → sec-bounty-
Resolution: --- → INVALID
You need to log in
before you can comment on or make changes to this bug.
Description
•