Bugzilla – Bug 1174297
VUL-0: CVE-2020-14001: rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution
Last modified: 2022-09-12 16:20:35 UTC
CVE-2020-14001 The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum. Reference and upstream commit: https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde References: https://bugzilla.redhat.com/show_bug.cgi?id=1858395 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14001 https://github.com/gettalong/kramdown https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0 https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14001 https://kramdown.gettalong.org https://kramdown.gettalong.org/news.html https://rubygems.org/gems/kramdown
Tracked SLE15 and Factory as affected
Factory has 2.4.0, so the issue is fixed there: ------------------------------------------------------------------- Tue Aug 11 01:44:29 UTC 2020 - Matthew Trescott <matthewtrescott@gmail.com> - updated to version 2.3.0 ## kramdown 2.3.0 released [...] [CVE-2020-14001]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14001
Submitted for 15/rubygem-kramdown. I believe all fixed.
SUSE-SU-2022:3259-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1174297 CVE References: CVE-2020-14001 JIRA References: Sources used: openSUSE Leap 15.4 (src): rubygem-kramdown-1.15.0-150000.3.3.1 openSUSE Leap 15.3 (src): rubygem-kramdown-1.15.0-150000.3.3.1 SUSE Linux Enterprise High Availability 15-SP4 (src): rubygem-kramdown-1.15.0-150000.3.3.1 SUSE Linux Enterprise High Availability 15-SP3 (src): rubygem-kramdown-1.15.0-150000.3.3.1 SUSE Linux Enterprise High Availability 15-SP2 (src): rubygem-kramdown-1.15.0-150000.3.3.1 SUSE Linux Enterprise High Availability 15-SP1 (src): rubygem-kramdown-1.15.0-150000.3.3.1 SUSE Linux Enterprise High Availability 15 (src): rubygem-kramdown-1.15.0-150000.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.