CVE-2023-43115

HIGH

Artifex Ghostscript <10.01.2 - RCE

Title source: llm

Description

In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).

Exploits (2)

nomisec WRITEUP 8 stars
by jostaub · poc
https://github.com/jostaub/ghostscript-CVE-2023-43115
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/ghostscript-CVE-2023-43115

Scores

CVSS v3 8.8
EPSS 0.2168
EPSS Percentile 95.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

Status published
Products (3)
artifex/ghostscript < 10.01.2
fedoraproject/fedora 38
fedoraproject/fedora 39
Published Sep 18, 2023
Tracked Since Feb 18, 2026