Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-33870

Опубликовано: 16 мая 2024
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

A flaw was found in Ghostscript. When the gp_validate_path_len function validates a path, it distinguishes between absolute and relative paths. In the case of relative paths, it will check the path with and without the current-directory-prefix ("foo" and "./foo"). This does not take into account paths with a parent-directory-prefix. Therefore, a path like "../../foo" is also tested as "./../../foo" and if the current directory "./" is in the permitted paths, it will pass the check, which may allow arbitrary file access.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ghostscriptNot affected
Red Hat Enterprise Linux 6ghostscriptOut of support scope
Red Hat Enterprise Linux 7ghostscriptOut of support scope
Red Hat Enterprise Linux 8ghostscriptWill not fix
Red Hat Enterprise Linux 8gimp:flatpak/ghostscriptWill not fix
Red Hat Enterprise Linux 9ghostscriptFixedRHSA-2024:619703.09.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportghostscriptFixedRHSA-2024:646609.09.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-23
https://bugzilla.redhat.com/show_bug.cgi?id=2293959ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths

EPSS

Процентиль: 16%
0.00051
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
около 1 года назад

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

CVSS3: 6.3
nvd
около 1 года назад

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

CVSS3: 6.3
debian
около 1 года назад

An issue was discovered in Artifex Ghostscript before 10.03.1. There i ...

CVSS3: 6.3
github
около 1 года назад

An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.

CVSS3: 6.8
fstec
больше 1 года назад

Уязвимость интерпретатора набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками в обработке относительного пути к каталогу, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 16%
0.00051
Низкий

6.8 Medium

CVSS3