CVE-2024-33870: n/a
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
AI Analysis
Technical Summary
CVE-2024-33870 is a path traversal vulnerability identified in Artifex Ghostscript versions prior to 10.03.1. Ghostscript is a widely used interpreter for PostScript and PDF files, often employed in printing, document processing, and embedded systems. The vulnerability stems from improper sanitization of file paths within PostScript documents. Specifically, an attacker can craft a PostScript file containing relative path sequences such as ../../foo, which Ghostscript incorrectly transforms to ./../../foo. If the current directory is included in the permitted paths, this manipulation allows unauthorized access to arbitrary files outside the intended directory scope. This can lead to disclosure of sensitive files, potential modification of files, or disruption of service depending on the context in which Ghostscript is used. The vulnerability does not require authentication or user interaction, and the attack vector is remote if Ghostscript processes untrusted PostScript documents. The CVSS 3.1 base score is 6.3, reflecting medium severity with low attack complexity and no privileges required. No public exploits have been reported yet, but the flaw represents a significant risk in environments where Ghostscript processes documents from untrusted sources. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of CVE-2024-33870 is unauthorized access to arbitrary files on systems running vulnerable versions of Ghostscript. This can lead to confidentiality breaches if sensitive files are exposed, such as configuration files, credentials, or private data. Integrity could be compromised if attackers leverage the vulnerability to overwrite or manipulate files, although this depends on the deployment context and file system permissions. Availability impacts are possible if critical files are deleted or corrupted, potentially disrupting document processing workflows or dependent services. Since Ghostscript is embedded in many print servers, document management systems, and software development tools, exploitation could affect a broad range of organizations globally. The vulnerability is particularly concerning in environments where Ghostscript processes documents from untrusted or external sources, such as public-facing web applications or automated document pipelines. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the impact scope is somewhat limited by the need for the current directory to be in permitted paths, which may reduce exposure in some configurations.
Mitigation Recommendations
To mitigate CVE-2024-33870, organizations should upgrade Ghostscript to version 10.03.1 or later, where the vulnerability is patched. Until patching is possible, restrict the directories that Ghostscript can access by configuring permitted paths carefully and avoiding including the current directory (./) in these paths. Implement strict file system permissions to limit Ghostscript's access to sensitive files and directories. Employ input validation and filtering to prevent processing of untrusted or malicious PostScript documents, especially in automated workflows or public-facing services. Consider sandboxing or containerizing Ghostscript processes to isolate potential exploitation impacts. Monitor logs for unusual file access patterns indicative of path traversal attempts. Additionally, review and harden any integration points where Ghostscript is invoked, ensuring minimal privileges and adherence to the principle of least privilege. Regularly audit and update Ghostscript deployments as part of vulnerability management processes.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, India, Canada, Australia
CVE-2024-33870: n/a
Description
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-33870 is a path traversal vulnerability identified in Artifex Ghostscript versions prior to 10.03.1. Ghostscript is a widely used interpreter for PostScript and PDF files, often employed in printing, document processing, and embedded systems. The vulnerability stems from improper sanitization of file paths within PostScript documents. Specifically, an attacker can craft a PostScript file containing relative path sequences such as ../../foo, which Ghostscript incorrectly transforms to ./../../foo. If the current directory is included in the permitted paths, this manipulation allows unauthorized access to arbitrary files outside the intended directory scope. This can lead to disclosure of sensitive files, potential modification of files, or disruption of service depending on the context in which Ghostscript is used. The vulnerability does not require authentication or user interaction, and the attack vector is remote if Ghostscript processes untrusted PostScript documents. The CVSS 3.1 base score is 6.3, reflecting medium severity with low attack complexity and no privileges required. No public exploits have been reported yet, but the flaw represents a significant risk in environments where Ghostscript processes documents from untrusted sources. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).
Potential Impact
The primary impact of CVE-2024-33870 is unauthorized access to arbitrary files on systems running vulnerable versions of Ghostscript. This can lead to confidentiality breaches if sensitive files are exposed, such as configuration files, credentials, or private data. Integrity could be compromised if attackers leverage the vulnerability to overwrite or manipulate files, although this depends on the deployment context and file system permissions. Availability impacts are possible if critical files are deleted or corrupted, potentially disrupting document processing workflows or dependent services. Since Ghostscript is embedded in many print servers, document management systems, and software development tools, exploitation could affect a broad range of organizations globally. The vulnerability is particularly concerning in environments where Ghostscript processes documents from untrusted or external sources, such as public-facing web applications or automated document pipelines. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. However, the impact scope is somewhat limited by the need for the current directory to be in permitted paths, which may reduce exposure in some configurations.
Mitigation Recommendations
To mitigate CVE-2024-33870, organizations should upgrade Ghostscript to version 10.03.1 or later, where the vulnerability is patched. Until patching is possible, restrict the directories that Ghostscript can access by configuring permitted paths carefully and avoiding including the current directory (./) in these paths. Implement strict file system permissions to limit Ghostscript's access to sensitive files and directories. Employ input validation and filtering to prevent processing of untrusted or malicious PostScript documents, especially in automated workflows or public-facing services. Consider sandboxing or containerizing Ghostscript processes to isolate potential exploitation impacts. Monitor logs for unusual file access patterns indicative of path traversal attempts. Additionally, review and harden any integration points where Ghostscript is invoked, ensuring minimal privileges and adherence to the principle of least privilege. Regularly audit and update Ghostscript deployments as part of vulnerability management processes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c49b7ef31ef0b561f6b
Added to database: 2/25/2026, 9:40:25 PM
Last enriched: 2/26/2026, 4:37:41 AM
Last updated: 4/12/2026, 6:11:16 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.