Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33869: n/a

0
Medium
VulnerabilityCVE-2024-33869cvecve-2024-33869
Published: Wed Jul 03 2024 (07/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33869 is a medium severity vulnerability in Artifex Ghostscript versions before 10. 03. 1. It involves a path traversal flaw in the path reduction logic within base/gpmisc. c, allowing crafted PostScript documents to bypass restrictions on the use of %pipe% and execute arbitrary commands. Exploitation requires local access and user interaction, with no privileges required. The vulnerability can lead to limited confidentiality, integrity, and availability impacts. No known exploits are currently in the wild, and no patches have been linked yet. Organizations using vulnerable Ghostscript versions should be cautious when processing untrusted PostScript files. This flaw is classified under CWE-22 (Path Traversal).

AI-Powered Analysis

AILast updated: 02/26/2026, 04:37:29 UTC

Technical Analysis

CVE-2024-33869 is a path traversal and command execution vulnerability discovered in Artifex Ghostscript versions prior to 10.03.1. The issue arises from improper path reduction logic in the source file base/gpmisc.c, which fails to correctly sanitize and restrict the use of special file path components such as '..' and the %pipe% operator. Specifically, crafted PostScript documents can exploit this flaw by embedding sequences like aa/../%pipe%command# in output filenames, effectively bypassing intended restrictions on %pipe% usage. This allows an attacker to execute arbitrary commands on the host system when the PostScript file is processed. The vulnerability requires local access and user interaction to trigger, as the malicious PostScript document must be opened or processed by the user. The CVSS 3.1 base score is 5.3 (medium), reflecting limited impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The vulnerability is categorized under CWE-22 (Path Traversal), indicating that the root cause is insufficient validation of file path inputs. No public exploits or patches have been reported at the time of publication, but the issue poses a risk to environments where Ghostscript processes untrusted or user-supplied PostScript files.

Potential Impact

The primary impact of CVE-2024-33869 is the potential for local command execution via crafted PostScript documents, which can compromise system integrity and availability. Confidentiality impact is limited but possible if commands allow access to sensitive data. Since exploitation requires local access and user interaction, remote exploitation is unlikely without additional attack vectors. Organizations running Ghostscript in environments that process untrusted PostScript files—such as print servers, document processing pipelines, or embedded systems—may face risks of unauthorized command execution, leading to system compromise or disruption. The medium severity score reflects that while the vulnerability is serious, it is not trivially exploitable remotely and requires user involvement. However, in high-security environments or those with automated document processing, the risk is elevated. The lack of known exploits reduces immediate threat but does not eliminate future risk once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-33869, organizations should: 1) Upgrade Ghostscript to version 10.03.1 or later once available, as the fix addresses the path traversal and command execution flaw. 2) Until patches are applied, restrict processing of untrusted PostScript files by implementing strict input validation and sandboxing of Ghostscript processes to limit command execution capabilities. 3) Employ application whitelisting and least privilege principles to reduce the impact of potential command execution. 4) Monitor logs for unusual Ghostscript activity or unexpected command executions. 5) If possible, disable or restrict the use of %pipe% functionality in Ghostscript configurations to prevent command injection vectors. 6) Educate users about the risks of opening untrusted PostScript documents and enforce policies to avoid processing files from unknown sources. 7) Consider deploying Ghostscript in isolated environments or containers to contain potential exploitation effects.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c49b7ef31ef0b561f67

Added to database: 2/25/2026, 9:40:25 PM

Last enriched: 2/26/2026, 4:37:29 AM

Last updated: 2/26/2026, 9:34:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats