vulnerability
SUSE: CVE-2020-14001: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 17, 2020 | Aug 9, 2024 | Aug 9, 2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 17, 2020
Added
Aug 9, 2024
Modified
Aug 9, 2024
Description
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
Solutions
suse-upgrade-ruby2-5-rubygem-kramdownsuse-upgrade-ruby2-5-rubygem-kramdown-docsuse-upgrade-ruby2-5-rubygem-kramdown-testsuite
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.