CVE-2020-14001

Name
CVE-2020-14001
Description
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://kramdown.gettalong.org
Release Notes https://kramdown.gettalong.org/news.html
Patch https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0
Third Party Advisory https://github.com/gettalong/kramdown
Patch https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde
Third Party Advisory https://rubygems.org/gems/kramdown
Third Party Advisory https://security.netapp.com/advisory/ntap-20200731-0004/
Mailing List https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E
Mailing List https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html
Third Party Advisory https://www.debian.org/security/2020/dsa-4743
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/
UBUNTU https://usn.ubuntu.com/4562-1/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:kramdown_project:kramdown:*:*:*:*:*:ruby:*:* ruby-kramdown >= None < 2.3.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status