Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33870: n/a

0
Medium
VulnerabilityCVE-2024-33870cvecve-2024-33870
Published: Wed Jul 03 2024 (07/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33870 is a path traversal vulnerability in Artifex Ghostscript versions before 10. 03. 1. It allows an attacker to craft a malicious PostScript document that can access arbitrary files if the current directory is within permitted paths. The vulnerability arises from improper handling of relative paths, enabling traversal sequences like .. /.. /foo to be transformed and accessed improperly. This flaw can lead to limited confidentiality, integrity, and availability impacts without requiring user interaction or privileges. The vulnerability has a CVSS score of 6. 3, indicating medium severity.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:37:41 UTC

Technical Analysis

CVE-2024-33870 is a path traversal vulnerability identified in Artifex Ghostscript versions prior to 10.03.1. Ghostscript is a widely used interpreter for PostScript and PDF files, often employed in printing, document processing, and embedded systems. The vulnerability stems from improper sanitization of file paths within PostScript documents. Specifically, an attacker can craft a PostScript file containing relative path sequences such as ../../foo, which Ghostscript incorrectly transforms to ./../../foo. If the current directory is included in the permitted paths, this manipulation allows unauthorized access to arbitrary files outside the intended directory scope. This can lead to disclosure of sensitive files, potential modification of files, or disruption of service depending on the context in which Ghostscript is used. The vulnerability does not require authentication or user interaction, and the attack vector is remote if Ghostscript processes untrusted PostScript documents. The CVSS 3.1 base score is 6.3, reflecting medium severity with low attack complexity and no privileges required. No public exploits have been reported yet, but the flaw represents a significant risk in environments where Ghostscript processes documents from untrusted sources. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).

Potential Impact

The primary impact of CVE-2024-33870 is unauthorized access to arbitrary files on systems running vulnerable versions of Ghostscript. This can lead to confidentiality breaches if sensitive files are exposed, such as configuration files, credentials, or private data. Integrity could be compromised if attackers leverage the vulnerability to overwrite or manipulate files, although this depends on the deployment context and file system permissions. Availability impacts are possible if critical files are deleted or corrupted, potentially disrupting document processing workflows or dependent services. Since Ghostscript is embedded in many print servers, document management systems, and software development tools, exploitation could affect a broad range of organizations globally. The vulnerability is particularly concerning in environments where Ghostscript processes documents from untrusted or external sources, such as public-facing web applications or automated document pipelines. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the impact scope is somewhat limited by the need for the current directory to be in permitted paths, which may reduce exposure in some configurations.

Mitigation Recommendations

To mitigate CVE-2024-33870, organizations should upgrade Ghostscript to version 10.03.1 or later, where the vulnerability is patched. Until patching is possible, restrict the directories that Ghostscript can access by configuring permitted paths carefully and avoiding including the current directory (./) in these paths. Implement strict file system permissions to limit Ghostscript's access to sensitive files and directories. Employ input validation and filtering to prevent processing of untrusted or malicious PostScript documents, especially in automated workflows or public-facing services. Consider sandboxing or containerizing Ghostscript processes to isolate potential exploitation impacts. Monitor logs for unusual file access patterns indicative of path traversal attempts. Additionally, review and harden any integration points where Ghostscript is invoked, ensuring minimal privileges and adherence to the principle of least privilege. Regularly audit and update Ghostscript deployments as part of vulnerability management processes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c49b7ef31ef0b561f6b

Added to database: 2/25/2026, 9:40:25 PM

Last enriched: 2/26/2026, 4:37:41 AM

Last updated: 2/26/2026, 8:02:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats