Local File Inclusion vulnerability in zmarkdown
Low severity
GitHub Reviewed
Published
Aug 31, 2021
in
zestedesavoir/zmarkdown
•
Updated May 14, 2024
Description
Published to the GitHub Advisory Database
Feb 3, 2024
Reviewed
Feb 3, 2024
Last updated
May 14, 2024
Impact
A minor Local File Inclusion vulnerability has been found in
zmarkdown
, which allowed for images with a known path onthe host machine to be included inside a LaTeX document.
To prevent it, a new option has been created that allow to replace
invalid paths with a default image instead of linking the image on the
host directly.
zmarkdown
has been updated to make this setting thedefault.
Every user of
zmarkdown
is likely impacted, except ifdisabling LaTeX generation or images download. Here
is an example of including an image from an invalid path:
Will effectively redownload and include the image
found at
/tmp/img.png
.Patches
The vulnerability has been patched in version 10.1.3.
If impacted, you should update to this version as soon as possible.
Workarounds
Disable images downloading, or sanitize paths.
For more information
If you have any questions or comments about this advisory, open an issue in ZMarkdown.
References