TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Shell in the Ghost: Ghostscript CVE-2023-28879 writeup

50 点作者 notmine1337大约 2 年前

4 条评论

j-krieger大约 2 年前
Great writeup. The more I learn about GhostScript &#x2F; PostsScript &#x2F; PDF‘s in general, the more I‘m amazed that such a complicated system can produce simple documents that are relied upon by billions of people.<p>I feel when like compared to a lot of other consumer facing software, PDF‘s are an incredible achievement. 99% of the time, a PDF will look and work the exact same to every user regardless of their environment. They can be editable at the exact needed places and when I print them, I can be sure the result will look exactly as I expect.<p>The only gripe I have with them is that while I can easily specify input fields, easily extracting that data isn‘t always as reliable.
评论 #35534527 未加载
1attice大约 2 年前
This is the most perfectly named CVE.
评论 #35533643 未加载
pengaru大约 2 年前
Kind of horrifying to hear ghostscript is being invoked on untrusted inputs via the web... that program must have an endless supply of RCEs if one just looks.
ftxbro大约 2 年前
So maybe this is off topic, but is anyone going around with GPT-4 to re-examine every single public source code for more new exploits yet?