CVE-2020-14001 — Missing Authorization in Project Kramdown
Severity
9.8CRITICALNVD
EPSS
9.3%
top 7.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 17
Latest updateOct 26
Description
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 31, 32, Ubuntu Linux 20.04
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5GitLab▶
CVE-2020-14001: The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such a↗2020-07-17
Red Hat▶
rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution↗2020-06-27
Debian▶
CVE-2020-14001: ruby-kramdown - The kramdown gem before 2.3.0 for Ruby processes the template option inside Kram...↗2020
💬Community
3Bugzilla▶
CVE-2020-14001 rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution↗2020-07-17
Bugzilla▶
CVE-2020-14001 rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution [epel-7]↗2020-07-17
Bugzilla▶
CVE-2020-14001 rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution [fedora-all]↗2020-07-17