Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29511: n/a

0
High
VulnerabilityCVE-2024-29511cvecve-2024-29511
Published: Wed Jul 03 2024 (07/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:57:17 UTC

Technical Analysis

CVE-2024-29511 is a high-severity directory traversal vulnerability affecting Artifex Ghostscript versions prior to 10.03.1 when integrated with Tesseract OCR for optical character recognition. The vulnerability arises from improper sanitization of the OCRLanguage parameter, which can be manipulated to traverse directories and access arbitrary files on the host system. This allows an attacker to read sensitive files such as /etc/passwd by specifying paths in parameters like user_patterns_file. Furthermore, the vulnerability permits writing error messages to arbitrary files, for example, by setting debug_file to a target path, potentially enabling limited file modification. The flaw requires no authentication or user interaction and can be exploited remotely, increasing its risk profile. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact with no integrity or availability impact. Although no public exploits have been reported yet, the vulnerability is significant given Ghostscript's widespread use in document processing and OCR workflows. The underlying weakness corresponds to CWE-489 (Directory Traversal). No official patches were linked at the time of publication, so mitigation may require configuration changes or temporary workarounds until updates are available.

Potential Impact

The primary impact of CVE-2024-29511 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers can access critical system files, configuration data, or application secrets, potentially leading to further compromise or data leakage. The ability to write error messages to arbitrary files, while limited, could be leveraged for partial file manipulation or to disrupt system operations. Since exploitation requires no authentication or user interaction and can be performed remotely, the vulnerability poses a significant risk to organizations running vulnerable Ghostscript versions with Tesseract OCR enabled. This risk is amplified in environments processing untrusted documents or exposed to external networks. Confidentiality breaches could affect compliance with data protection regulations and damage organizational reputation. However, the vulnerability does not directly impact system integrity or availability, limiting its scope to information disclosure.

Mitigation Recommendations

1. Upgrade Ghostscript to version 10.03.1 or later as soon as a patch becomes available to fully remediate the vulnerability. 2. Until patches are released, disable or restrict the use of Tesseract OCR integration within Ghostscript if feasible, especially in environments processing untrusted inputs. 3. Implement strict input validation and sanitization on parameters related to OCRLanguage, debug_file, and user_patterns_file to prevent directory traversal attempts. 4. Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious requests targeting OCR parameters. 5. Restrict file system permissions for the Ghostscript process to limit access to sensitive files and directories, minimizing the impact of potential exploitation. 6. Conduct regular security audits and scanning to detect vulnerable Ghostscript versions and anomalous file access patterns. 7. Educate developers and system administrators about the risks of directory traversal in OCR workflows and encourage secure coding practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da0b7ef31ef0b58984f

Added to database: 2/25/2026, 9:46:08 PM

Last enriched: 2/26/2026, 4:57:17 PM

Last updated: 4/12/2026, 2:01:23 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses