CVE-2025-48708: ghostscript can embed plaintext password in encrypted PDFs

4 hours ago 2
Openwall
[<prev] [day] [month] [year] [list] Message-ID: <[email protected]> Date: Fri, 23 May 2025 14:24:14 -0700 From: Alan Coopersmith <[email protected]> To: [email protected] Subject: CVE-2025-48708: ghostscript can embed plaintext password in encrypted PDFs https://www.cve.org/CVERecord?id=CVE-2025-48708 was published today with this description: gs_lib_ctx_stash_sanitized_arg in base/gslibctx.c in Artifex Ghostscript before 10.05.1 lacks argument sanitization for the # case. A created PDF document includes its password in cleartext. The bug report at https://bugs.ghostscript.com/show_bug.cgi?id=708446 says: When generating a password-protected PDF using the latest version of the tool on Windows 10, I noticed that the full command-line input, including the plaintext password, is embedded at the beginning of the generated PDF file. This allows anyone with access to the PDF to retrieve the password simply by running a command like "type" (Windows) or "cat" (Linux/macOS) on the file. The fix included in the 10.05.1 release appears to be: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?h=gs10.05.1&id=5b5968c306b3e35cdeec83bb15026fd74a7334de -- -Alan Coopersmith- [email protected] Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

Read Entire Article