[ https://issues.apache.org/jira/browse/TIKA-4465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18014101#comment-18014101 ]
Tilman Hausherr edited comment on TIKA-4465 at 8/15/25 12:36 PM: ----------------------------------------------------------------- I found one (and ChatGPT couldn't): https://tetra4d.com/pdf-samples/ https://tetra4d.com/wp-content/uploads/2024/10/3D-PDF-Sample-Chasis-V03042024.pdf The javascript is here: {{Root/Pages/Kids/[0]/Annots/[0]/3DD/OnInstantiate}} And another: https://pdfa.org/3d-pdf-showcase/ https://pdfa.org/wp-content/uploads/2021/12/Make-Buy-BOM-to-EBOM-Alignment-Example.pdf The javascript is here: {{Root/Pages/Kids/[0]/Annots/[28]/3DD/OnInstantiate}} was (Author: tilman): I found one (and ChatGPT couldn't): https://tetra4d.com/pdf-samples/ https://tetra4d.com/wp-content/uploads/2024/10/3D-PDF-Sample-Chasis-V03042024.pdf The javascript is here: {{Root/Pages/Kids/[0]/Annots/[0]/3DD/OnInstantiate}} > Extract javascript from name dictionary in PDFs > ----------------------------------------------- > > Key: TIKA-4465 > URL: https://issues.apache.org/jira/browse/TIKA-4465 > Project: Tika > Issue Type: Task > Reporter: Tim Allison > Priority: Minor > > This blog > [https://labs.senhasegura.blog/unmasking-the-threat-a-deep-dive-into-the-pdf-malicious-2/] > mentions this malware file (be careful! dangerous!): > [https://bazaar.abuse.ch/download/4dc9b0c20ea61d91d6a1b5bdce76fb5365de0762efb8f6c2925113c6a8950cae/] > > > We're currently extracting javascript from actions, but not from the name > tree (document level-javascript). > > We should add this extraction if "extractActions" is set to true... or > better, come up with a better name for that variable in trunk. > > Related to this, I'd also like to extract javascript in TikaCLI by default as > we do for extracting inline images and incremental updates. -- This message was sent by Atlassian Jira (v8.20.10#820010)