Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-14001
Description:The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
Test IDs: 1.3.6.1.4.1.25623.1.0.892316   1.3.6.1.4.1.25623.1.0.854980   1.3.6.1.4.1.25623.1.0.844676   1.3.6.1.4.1.25623.1.0.844631   1.3.6.1.4.1.25623.1.0.878209   1.3.6.1.4.1.25623.1.0.878211   1.3.6.1.4.1.25623.1.0.704743  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-14001
Debian Security Information: DSA-4743 (Google Search)
https://www.debian.org/security/2020/dsa-4743
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/
https://github.com/gettalong/kramdown
https://kramdown.gettalong.org
https://rubygems.org/gems/kramdown
https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html
https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E
https://usn.ubuntu.com/4562-1/




© 1998-2025 E-Soft Inc. All rights reserved.