An issue was discovered in Artifex Ghostscript before 10...
Moderate severity
Unreviewed
Published
Jul 3, 2024
to the GitHub Advisory Database
•
Updated Oct 31, 2024
Description
Published by the National Vulnerability Database
Jul 3, 2024
Published to the GitHub Advisory Database
Jul 3, 2024
Last updated
Oct 31, 2024
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
References