PDF documents are vulnerable to diode exfiltration attacks due to partial encryption and the use of legacy crypto like unauthenticated CBC. These vulnerabilities can be exploited through gadgets and hyperlinks, allowing for the leakage of plaintext and other sensitive information.
- PDF documents allow for partial encryption, leading to diode exfiltration attacks
- Legacy crypto like unauthenticated CBC is used in PDF documents, making them vulnerable to plaintext leakage
- Gadgets and hyperlinks can be used to exploit these vulnerabilities and leak sensitive information
The presenter demonstrated how a script could be used to automatically extract plaintext from a PDF document using gadgets and hyperlinks. They also discussed the issues with using hyperlinks, such as the short length of gadgets and the random bytes in the URL that can break the link. The presenter also explained how compression can be used to hide plaintext in PDF documents, but it can also make exfiltration more complicated.