Bug 1174297 (CVE-2020-14001) - VUL-0: CVE-2020-14001: rubygem-kramdown: processing template options inside documents allows unintended read access or embedded Ruby code execution
Summary: VUL-0: CVE-2020-14001: rubygem-kramdown: processing template options inside d...
Status: RESOLVED FIXED
Alias: CVE-2020-14001
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/263937/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-14001:7.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-07-20 08:36 UTC by Alexandros Toptsoglou
Modified: 2024-05-09 18:36 UTC (History)
6 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2020-07-20 08:36:46 UTC
CVE-2020-14001

The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.

Reference and upstream commit:
https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1858395
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14001
https://github.com/gettalong/kramdown
https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0
https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14001
https://kramdown.gettalong.org
https://kramdown.gettalong.org/news.html
https://rubygems.org/gems/kramdown
Comment 1 Alexandros Toptsoglou 2020-07-20 08:37:34 UTC
Tracked SLE15 and Factory as affected
Comment 4 Petr Gajdos 2022-09-08 12:09:05 UTC
Factory has 2.4.0, so the issue is fixed there:

-------------------------------------------------------------------
Tue Aug 11 01:44:29 UTC 2020 - Matthew Trescott <matthewtrescott@gmail.com>

- updated to version 2.3.0
  ## kramdown 2.3.0 released

[...]

  [CVE-2020-14001]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14001
Comment 5 Petr Gajdos 2022-09-08 12:45:40 UTC
Submitted for 15/rubygem-kramdown.

I believe all fixed.
Comment 7 Swamp Workflow Management 2022-09-12 16:20:35 UTC
SUSE-SU-2022:3259-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1174297
CVE References: CVE-2020-14001
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
openSUSE Leap 15.3 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
SUSE Linux Enterprise High Availability 15-SP4 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
SUSE Linux Enterprise High Availability 15-SP3 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
SUSE Linux Enterprise High Availability 15-SP2 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    rubygem-kramdown-1.15.0-150000.3.3.1
SUSE Linux Enterprise High Availability 15 (src):    rubygem-kramdown-1.15.0-150000.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.