POC详情: 2351975b91389c82c357b979234464de8c28bceb

来源
关联漏洞
标题: Mozilla Firefox 安全漏洞 (CVE-2024-4367)
描述:Mozilla Firefox是美国Mozilla基金会的一款开源Web浏览器。 Mozilla Firefox 126 版本之前存在安全漏洞,该漏洞源于处理 PDF.js 中的字体时缺少类型检查,这将允许在 PDF.js 环境中执行任意 JavaScript。
描述
This Proof of Concept (PoC) demonstrates the exploitation of the CVE-2024-4367 vulnerability, which involves Cross-Site Scripting (XSS) attacks.
介绍
# CVE-2024-4367-PoC
This Proof of Concept (PoC) demonstrates the exploitation of the CVE-2024-4367 vulnerability, which involves Cross-Site Scripting (XSS) attacks.


# Features
This PoC collects and displays the following types of information:

## 1.	General Information:
-	Domain
-	Title
-	Current URL
-	Referrer URL
-	Cookies associated with the domain

## 2.	Browser Environment Information:
-	LocalStorage and SessionStorage data
-	User Agent
-	Screen resolution
-	Platform (Operating System)

## 3.	Web Features:
-	Cookies enabled/disabled
- Do Not Track status
-	Max touch points (e.g., for mobile devices)
-	Connection type (e.g., 4G, WiFi)
-	Battery level (if available)


## 4.	Screen Information:
-	Screen resolution
-	Color depth
-	Available width and height
-	Orientation of the screen

## 5.	Geolocation and Performance:
-	Geolocation availability
-	Device memory (if available)
-	Hardware concurrency (number of processor cores)

## 6.	WebRTC and Plugins:
-	Detection of WebRTC IP leakage
-	Installed browser plugins
-	Available languages for the browser



# sample of PoC

![PoC 1](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-1.png)

![PoC 2](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-2.png)

![PoC 3](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-3.png)

![PoC 4](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-4.png)

![PoC 5](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-5.png)

![PoC 6](https://github.com/inpentest/CVE-2024-4367-PoC/blob/main/sample/poc-6.png)
文件快照

[4.0K] /data/pocs/2351975b91389c82c357b979234464de8c28bceb ├── [3.7K] CVE-2024-4367-PoC.pdf ├── [1.0K] LICENSE ├── [1.6K] README.md └── [4.0K] sample ├── [ 28K] poc-1.png ├── [ 35K] poc-2.png ├── [ 16K] poc-3.png ├── [ 16K] poc-4.png ├── [ 11K] poc-5.png ├── [ 11K] poc-6.png └── [ 28] test 1 directory, 10 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。