{
  "threat_severity" : "Moderate",
  "public_date" : "2024-05-16T00:00:00Z",
  "bugzilla" : {
    "description" : "ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths",
    "id" : "2293959",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2293959"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-23",
  "details" : [ "An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.", "A flaw was found in Ghostscript. When the `gp_validate_path_len` function validates a path, it distinguishes between absolute and relative paths. In the case of relative paths, it will check the path with and without the current-directory-prefix (\"foo\" and \"./foo\"). This does not take into account paths with a parent-directory-prefix. Therefore, a path like \"../../foo\" is also tested as \"./../../foo\" and if the current directory \"./\" is in the permitted paths, it will pass the check, which may allow arbitrary file access." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-09-03T00:00:00Z",
    "advisory" : "RHSA-2024:6197",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "ghostscript-0:9.54.0-17.el9_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-09-09T00:00:00Z",
    "advisory" : "RHSA-2024:6466",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "ghostscript-0:9.54.0-12.el9_2.2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "gimp:flatpak/ghostscript",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-33870\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-33870" ],
  "name" : "CVE-2024-33870",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}