import java.io.*;
import java.util.List;
import java.util.Optional;
import java.util.stream.IntStream;
import org.apache.pdfbox.cos.COSObject;
import org.apache.pdfbox.pdmodel.PDDocument;
import org.apache.pdfbox.pdmodel.PDDocumentCatalog;
import org.apache.pdfbox.pdmodel.PDPageTree;
import org.apache.pdfbox.pdmodel.interactive.action.PDAction;
import org.apache.pdfbox.pdmodel.interactive.action.PDActionJavaScript;
import org.apache.pdfbox.pdmodel.interactive.action.PDFormFieldAdditionalActions;
import org.apache.pdfbox.pdmodel.interactive.annotation.PDAnnotationWidget;
import org.apache.pdfbox.pdmodel.interactive.form.PDAcroForm;
import org.apache.pdfbox.pdmodel.interactive.form.PDField;
import org.apache.pdfbox.pdmodel.interactive.form.PDNonTerminalField;
import org.apache.pdfbox.pdmodel.interactive.form.PDTerminalField;
public class PrintJavaScriptFields {
public static void main(String[] args) throws IOException {
String inputPath = "C:/Users/acer/Desktop/111.pdf";
File file=new File(inputPath);
System.out.println(containsJavaScript(file));
}
/**
* 校验pdf文件是否包含js脚本
**/
public static boolean containsJavaScript(File file) throws IOException {
PDDocument document = PDDocument.load(file);
return containsJavaScript(document);
}
/**
* 校验pdf文件是否包含js脚本
**/
public static boolean containsJavaScript(InputStream input) throws IOException {
PDDocument document = PDDocument.load(input);
return containsJavaScript(document);
}
/**
* 校验pdf文件是否包含js脚本
**/
public static boolean containsJavaScript(PDDocument document) {
try {
PDPageTree pages = document.getPages();
for(int i=0;i< pages.getCount();i++){
if(pages.get(i).getCOSObject().toString().contains("COSName{JS}")){
return true ;
}
}
return false ;
}catch (Exception e){
System.out.println("PDF效验异常:"+e.getMessage());
}
return false;
}
}
java 利用上传PDF SSL安全 渗透注入JavaScript 漏洞修复 更加简便
最新推荐文章于 2024-06-02 09:12:06 发布