This exploit targets CVE-2019-14811 in GS environments where PostScript output is not reflected, but is executed such as PDF previews via png images.# CVE-2019-14811 GhostScript PDF preview Exploit PoC
This exploit targets CVE-2019-14811 in GS environments where PostScript output is not reflected, but is executed such as PDF previews via png images.
Exploit renders commands directly in (pngXXm) preview, it is based on https://github.com/hhc0null/GhostRule/blob/master/ghostrule1.ps.
The `dSafer` flag gets overridden to allow execution of arbitrary commands using `.forceput` via `.pdf_hook_DSC_Creator`. See screenshot below.

[4.0K] /data/pocs/10871e2fc21e0ccd9c2d41174c3c7b47caddd49a
├── [3.7K] exploit.pdf
├── [2.9K] exploit.ps
├── [4.0K] images
│ └── [345K] showcase.png
└── [ 518] README.md
1 directory, 4 files