PDF.js Express 8.7.4
Hi, PDF.js team,
After running security scan on our application which relies on PDF.js Express, we found multiple issues. Could you please clarify if those might be fixed in the nearest future as a part of technical support? Do you think you would be able to provide more information regarding those issues?
Here is the issue to file mapping:
{
“CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator(PRNG)”: [
“econsent\public\webviewer\core\external\decode.min.js”,
“econsent\public\webviewer\core\external\model-viewer-1.3.0.min.js”,
“econsent\public\webviewer\core\external\model-viewer-legacy-1.3.0.min.js”,
“econsent\public\webviewer\core\external\webcomponents-bundle.js”,
“econsent\public\webviewer\core\legacyoffice\legacyofficeworker.js”,
“econsent\public\webviewer\core\pdfjs\pdf.worker.js”,
“econsent\public\webviewer\core\pdfjs\pdfjsdocumenttype.js”,
“econsent\public\webviewer\core\pdfjs\pikaday.chunk.js”,
“econsent\public\webviewer\core\pikaday.chunk.js”,
“econsent\public\webviewer\core\webviewer-core.min.js”,
“econsent\public\webviewer\ui\webviewer-ui.min.js”
],
“CWE-564: SQL Injection: Hibernate”: [
“econsent\public\webviewer\core\external\decode.min.js”,
“econsent\public\webviewer\ui\webviewer-ui.min.js”
],
“CWE-327: Use of a Broken or Risky Cryptographic Algorithm”: [
“econsent\public\webviewer\core\pdfjs\pdf.worker.js”
],
“CWE-489: Active Debug Code”: [
“econsent\public\webviewer\core\external\decode.min.js”,
“econsent\public\webviewer\core\external\model-viewer-1.3.0.min.js”,
“econsent\public\webviewer\core\external\model-viewer-legacy-1.3.0.min.js”,
“econsent\public\webviewer\core\webviewer-core.min.js”,
“econsent\public\webviewer\ui\webviewer-ui.min.js”
],
“CWE-312: Cleartext Storage of Sensitive Information”: [
“econsent\public\webviewer\core\external\decode.min.js”
],
“CWE-829: Inclusion of Functionality from Untrusted Control Sphere”: [
“econsent\public\webviewer\core\external\decode.min.js”,
“econsent\public\webviewer\core\external\model-viewer-1.3.0.min.js”,
“econsent\public\webviewer\core\external\model-viewer-legacy-1.3.0.min.js”,
“econsent\public\webviewer\core\legacyoffice\legacyofficeworker.js”,
“econsent\public\webviewer\core\pdfjs\pdfjsdocumenttype.js”,
“econsent\public\webviewer\ui\chunks\2.chunk.js”,
“econsent\public\webviewer\ui\webviewer-ui.min.js”
],
“CWE-798: Use of Hard-coded Credentials”: [
“econsent\public\webviewer\core\pdfjs\pdfjsdocumenttype.js”,
“econsent\public\webviewer\core\webviewer-core.min.js”,
“econsent\public\webviewer\ui\webviewer-ui.min.js”
],
“CWE-94: Improper Control of Generation of Code (‘Code Injection’)”: [
“econsent\public\webviewer\core\pdfjs\pdfjsdocumenttype.js”
],
“CWE-20: Improper Input Validation”: [
“econsent\public\webviewer\core\webviewerserverpartretriever.chunk.js”
],
“CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)”: [
“econsent\public\webviewer\ui\webviewer-ui.min.js”,
“public\webviewer\core\contentedit.chunk.js”,
“public\webviewer\core\pikaday.chunk.js”,
“public\webviewer\core\pdfjs\pikaday.chunk.js”,
“public\webviewer\core\external\webcomponents-bundle.js”
],
“CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes”: [
“public\webviewer\core\external\webcomponents-bundle.js”,
“public\webviewer\core\webviewerserverpartretriever.chunk.js”
],
“CWE-345: Insufficient Verification of Data Authenticity”: [
“public\webviewer\core\legacyoffice\legacyofficeworker.js”
],
“The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. For more information checkout the CWE-798 (CWE - CWE-798: Use of Hard-coded Credentials (4.14)) advisory.”: [
“econsent\public\webviewer\ui\i18n\translation-en.json”,
“econsent\public\webviewer\ui\webviewer-ui.min.js.map”
],
“When use AWS Secret Key is recommended use vault or environment variable encrypted for the best security. For more information checkout the CWE-798 (CWE - CWE-798: Use of Hard-coded Credentials (4.14)) advisory.”: [
“econsent\public\webviewer\ui\webviewer-ui.min.js.map”
],
“CWE-1333: Inefficient Regular Expression Complexity”: [
“public\webviewer\core\pdfjs\vendors.pikaday.chunk.js”,
“public\webviewer\core\external\webcomponents-bundle.js”
],
“CWE-319: Cleartext Transmission of Sensitive Information”: [
“public\webviewer\core\webviewerserverpartretriever.chunk.js”
]
}