[
https://issues.apache.org/jira/browse/TIKA-4465?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18014101#comment-18014101
]
Tilman Hausherr edited comment on TIKA-4465 at 8/15/25 12:36 PM:
-----------------------------------------------------------------
I found one (and ChatGPT couldn't):
https://tetra4d.com/pdf-samples/
https://tetra4d.com/wp-content/uploads/2024/10/3D-PDF-Sample-Chasis-V03042024.pdf
The javascript is here: {{Root/Pages/Kids/[0]/Annots/[0]/3DD/OnInstantiate}}
And another:
https://pdfa.org/3d-pdf-showcase/
https://pdfa.org/wp-content/uploads/2021/12/Make-Buy-BOM-to-EBOM-Alignment-Example.pdf
The javascript is here: {{Root/Pages/Kids/[0]/Annots/[28]/3DD/OnInstantiate}}
was (Author: tilman):
I found one (and ChatGPT couldn't):
https://tetra4d.com/pdf-samples/
https://tetra4d.com/wp-content/uploads/2024/10/3D-PDF-Sample-Chasis-V03042024.pdf
The javascript is here: {{Root/Pages/Kids/[0]/Annots/[0]/3DD/OnInstantiate}}
> Extract javascript from name dictionary in PDFs
> -----------------------------------------------
>
> Key: TIKA-4465
> URL: https://issues.apache.org/jira/browse/TIKA-4465
> Project: Tika
> Issue Type: Task
> Reporter: Tim Allison
> Priority: Minor
>
> This blog
> [https://labs.senhasegura.blog/unmasking-the-threat-a-deep-dive-into-the-pdf-malicious-2/]
> mentions this malware file (be careful! dangerous!):
> [https://bazaar.abuse.ch/download/4dc9b0c20ea61d91d6a1b5bdce76fb5365de0762efb8f6c2925113c6a8950cae/]
>
>
> We're currently extracting javascript from actions, but not from the name
> tree (document level-javascript).
>
> We should add this extraction if "extractActions" is set to true... or
> better, come up with a better name for that variable in trunk.
>
> Related to this, I'd also like to extract javascript in TikaCLI by default as
> we do for extracting inline images and incremental updates.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)