CVE-2024-33870: n/a
CVE-2024-33870 is a path traversal vulnerability in Artifex Ghostscript versions before 10. 03. 1. It allows an attacker to craft a malicious PostScript document that can access arbitrary files if the current directory is within permitted paths. The vulnerability arises from improper handling of relative paths, enabling traversal sequences like .. /.. /foo to be transformed and accessed improperly. This flaw can lead to limited confidentiality, integrity, and availability impacts without requiring user interaction or privileges. The vulnerability has a CVSS score of 6. 3, indicating medium severity.
AI Analysis
Technical Summary
CVE-2024-33870 is a path traversal vulnerability identified in Artifex Ghostscript versions prior to 10.03.1. Ghostscript is a widely used interpreter for PostScript and PDF files, often employed in printing, document processing, and embedded systems. The vulnerability stems from improper sanitization of file paths within PostScript documents. Specifically, an attacker can craft a PostScript file containing relative path sequences such as ../../foo, which Ghostscript incorrectly transforms to ./../../foo. If the current directory is included in the permitted paths, this manipulation allows unauthorized access to arbitrary files outside the intended directory scope. This can lead to disclosure of sensitive files, potential modification of files, or disruption of service depending on the context in which Ghostscript is used. The vulnerability does not require authentication or user interaction, and the attack vector is remote if Ghostscript processes untrusted PostScript documents. The CVSS 3.1 base score is 6.3, reflecting medium severity with low attack complexity and no privileges required. No public exploits have been reported yet, but the flaw represents a significant risk in environments where Ghostscript processes documents from untrusted sources. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of CVE-2024-33870 is unauthorized access to arbitrary files on systems running vulnerable versions of Ghostscript. This can lead to confidentiality breaches if sensitive files are exposed, such as configuration files, credentials, or private data. Integrity could be compromised if attackers leverage the vulnerability to overwrite or manipulate files, although this depends on the deployment context and file system permissions. Availability impacts are possible if critical files are deleted or corrupted, potentially disrupting document processing workflows or dependent services. Since Ghostscript is embedded in many print servers, document management systems, and software development tools, exploitation could affect a broad range of organizations globally. The vulnerability is particularly concerning in environments where Ghostscript processes documents from untrusted or external sources, such as public-facing web applications or automated document pipelines. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the impact scope is somewhat limited by the need for the current directory to be in permitted paths, which may reduce exposure in some configurations.
Mitigation Recommendations
To mitigate CVE-2024-33870, organizations should upgrade Ghostscript to version 10.03.1 or later, where the vulnerability is patched. Until patching is possible, restrict the directories that Ghostscript can access by configuring permitted paths carefully and avoiding including the current directory (./) in these paths. Implement strict file system permissions to limit Ghostscript's access to sensitive files and directories. Employ input validation and filtering to prevent processing of untrusted or malicious PostScript documents, especially in automated workflows or public-facing services. Consider sandboxing or containerizing Ghostscript processes to isolate potential exploitation impacts. Monitor logs for unusual file access patterns indicative of path traversal attempts. Additionally, review and harden any integration points where Ghostscript is invoked, ensuring minimal privileges and adherence to the principle of least privilege. Regularly audit and update Ghostscript deployments as part of vulnerability management processes.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia
CVE-2024-33870: n/a
Description
CVE-2024-33870 is a path traversal vulnerability in Artifex Ghostscript versions before 10. 03. 1. It allows an attacker to craft a malicious PostScript document that can access arbitrary files if the current directory is within permitted paths. The vulnerability arises from improper handling of relative paths, enabling traversal sequences like .. /.. /foo to be transformed and accessed improperly. This flaw can lead to limited confidentiality, integrity, and availability impacts without requiring user interaction or privileges. The vulnerability has a CVSS score of 6. 3, indicating medium severity.
AI-Powered Analysis
Technical Analysis
CVE-2024-33870 is a path traversal vulnerability identified in Artifex Ghostscript versions prior to 10.03.1. Ghostscript is a widely used interpreter for PostScript and PDF files, often employed in printing, document processing, and embedded systems. The vulnerability stems from improper sanitization of file paths within PostScript documents. Specifically, an attacker can craft a PostScript file containing relative path sequences such as ../../foo, which Ghostscript incorrectly transforms to ./../../foo. If the current directory is included in the permitted paths, this manipulation allows unauthorized access to arbitrary files outside the intended directory scope. This can lead to disclosure of sensitive files, potential modification of files, or disruption of service depending on the context in which Ghostscript is used. The vulnerability does not require authentication or user interaction, and the attack vector is remote if Ghostscript processes untrusted PostScript documents. The CVSS 3.1 base score is 6.3, reflecting medium severity with low attack complexity and no privileges required. No public exploits have been reported yet, but the flaw represents a significant risk in environments where Ghostscript processes documents from untrusted sources. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of CVE-2024-33870 is unauthorized access to arbitrary files on systems running vulnerable versions of Ghostscript. This can lead to confidentiality breaches if sensitive files are exposed, such as configuration files, credentials, or private data. Integrity could be compromised if attackers leverage the vulnerability to overwrite or manipulate files, although this depends on the deployment context and file system permissions. Availability impacts are possible if critical files are deleted or corrupted, potentially disrupting document processing workflows or dependent services. Since Ghostscript is embedded in many print servers, document management systems, and software development tools, exploitation could affect a broad range of organizations globally. The vulnerability is particularly concerning in environments where Ghostscript processes documents from untrusted or external sources, such as public-facing web applications or automated document pipelines. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the impact scope is somewhat limited by the need for the current directory to be in permitted paths, which may reduce exposure in some configurations.
Mitigation Recommendations
To mitigate CVE-2024-33870, organizations should upgrade Ghostscript to version 10.03.1 or later, where the vulnerability is patched. Until patching is possible, restrict the directories that Ghostscript can access by configuring permitted paths carefully and avoiding including the current directory (./) in these paths. Implement strict file system permissions to limit Ghostscript's access to sensitive files and directories. Employ input validation and filtering to prevent processing of untrusted or malicious PostScript documents, especially in automated workflows or public-facing services. Consider sandboxing or containerizing Ghostscript processes to isolate potential exploitation impacts. Monitor logs for unusual file access patterns indicative of path traversal attempts. Additionally, review and harden any integration points where Ghostscript is invoked, ensuring minimal privileges and adherence to the principle of least privilege. Regularly audit and update Ghostscript deployments as part of vulnerability management processes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c49b7ef31ef0b561f6b
Added to database: 2/25/2026, 9:40:25 PM
Last enriched: 2/26/2026, 4:37:41 AM
Last updated: 2/26/2026, 8:02:19 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.