Description
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2316-1 | ruby-kramdown security update |
Debian DSA |
DSA-4743-1 | ruby-kramdown security update |
EUVD |
EUVD-2020-0635 | The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum. |
Github GHSA |
GHSA-mqm2-cgpr-p4m6 | Unintended read access in kramdown gem |
Ubuntu USN |
USN-4562-1 | kramdown vulnerability |
Ubuntu USN |
USN-4562-2 | kramdown vulnerability |
References
History
Wed, 28 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:32:14.657Z
Reserved: 2020-06-10T00:00:00.000Z
Link: CVE-2020-14001
No data.
Status : Modified
Published: 2020-07-17T16:15:11.230
Modified: 2024-11-21T05:02:19.567
Link: CVE-2020-14001
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN