CVE-2020-14001

EUVD-2020-0635
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 92%
Affected Products (NVD)
VendorProductVersion
kramdown_projectkramdown
𝑥
< 2.3.0
debiandebian_linux
9.0
debiandebian_linux
10.0
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-kramdown
bookworm
2.4.0-2
fixed
bullseye
2.3.0-5
fixed
sid
2.4.0-2
fixed
trixie
2.4.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-kramdown
bionic
needed
focal
Fixed 1.17.0-4ubuntu0.1
released
groovy
Fixed 1.17.0-4ubuntu0.20.10.1
released
hirsute
Fixed 2.3.0-4
released
impish
Fixed 2.3.0-4
released
jammy
Fixed 2.3.0-4
released
kinetic
Fixed 2.3.0-4
released
lunar
Fixed 2.3.0-4
released
mantic
Fixed 2.3.0-4
released
noble
Fixed 2.3.0-4
released
trusty
dne
xenial
needed
References