First published: Fri Jul 17 2020(Updated: )
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/kramdown | <2.3.0 | 2.3.0 |
debian/ruby-kramdown | <=1.17.0-4<=1.17.0-1 | 2.3.0-1 1.17.0-1+deb10u1 |
Kramdown Project Kramdown | <2.3.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Canonical Ubuntu Linux | =20.04 | |
ubuntu/ruby-kramdown | <1.17.0-4ubuntu0.1 | 1.17.0-4ubuntu0.1 |
ubuntu/ruby-kramdown | <1.17.0-4ubuntu0.20.10.1 | 1.17.0-4ubuntu0.20.10.1 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
ubuntu/ruby-kramdown | <2.3.0-4 | 2.3.0-4 |
debian/ruby-kramdown | 2.3.0-5 2.4.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14001 is a vulnerability in the kramdown gem before 2.3.0 for Ruby that allows unintended read access or unintended embedded Ruby code execution.
CVE-2020-14001 has a severity rating of 9.8 (critical).
To fix CVE-2020-14001, update kramdown to version 2.3.0 or later.
CVE-2020-14001 affects kramdown gem before 2.3.0 for Ruby.
You can find more information about CVE-2020-14001 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-14001), [GitHub Commit](https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde), [GitHub Comparison](https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0).