Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-29511
HistoryJul 03, 2024 - 12:00 a.m.

CVE-2024-29511

2024-07-0300:00:00
mitre
github.com
6
artifex ghostscript
ocr
directory traversal

AI Score

7.3

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Artifex Ghostscript before 10.03.1, when Tesseract is used for OCR, has a directory traversal issue that allows arbitrary file reading (and writing of error messages to arbitrary files) via OCRLanguage. For example, exploitation can use debug_file /tmp/out and user_patterns_file /etc/passwd.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:artifex:afpl_ghostscript:*:*:*:*:*:*:*:*"
    ],
    "vendor": "artifex",
    "product": "afpl_ghostscript",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "10.03.1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7.3

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total