kramdown is vulnerable to remote code execution. The vulnerability exists due to the lack of control over the values of kramdown template extension options.
github.com/gettalong/kramdown
github.com/gettalong/kramdown
github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde
github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0
github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0
kramdown.gettalong.org
kramdown.gettalong.org
kramdown.gettalong.org/news.html
lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E
lists.debian.org/debian-lts-announce/2020/08/msg00014.html
lists.fedoraproject.org/archives/list/[email protected]/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/
lists.fedoraproject.org/archives/list/[email protected]/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/
rubygems.org/gems/kramdown
rubygems.org/gems/kramdown
security.netapp.com/advisory/ntap-20200731-0004/
usn.ubuntu.com/4562-1/
www.debian.org/security/2020/dsa-4743