CVE-2020-14001

The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
kramdown_projectkramdown
𝑥
< 2.3.0
debiandebian_linux
9.0
debiandebian_linux
10.0
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-kramdown
bullseye
2.3.0-5
fixed
sid
2.4.0-2
fixed
trixie
2.4.0-2
fixed
bookworm
2.4.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-kramdown
noble
Fixed 2.3.0-4
released
mantic
Fixed 2.3.0-4
released
lunar
Fixed 2.3.0-4
released
kinetic
Fixed 2.3.0-4
released
jammy
Fixed 2.3.0-4
released
impish
Fixed 2.3.0-4
released
hirsute
Fixed 2.3.0-4
released
groovy
Fixed 1.17.0-4ubuntu0.20.10.1
released
focal
Fixed 1.17.0-4ubuntu0.1
released
bionic
needed
xenial
needed
trusty
dne
References