Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. zmarkdown
  4. ›
  5. GHSA-mq6v-w35g-3c97

GHSA-mq6v-w35g-3c97: Local File Inclusion vulnerability in zmarkdown

February 3, 2024 (updated May 14, 2024)

A minor Local File Inclusion vulnerability has been found in zmarkdown, which allowed for images with a known path on the host machine to be included inside a LaTeX document.

To prevent it, a new option has been created that allow to replace invalid paths with a default image instead of linking the image on the host directly. zmarkdown has been updated to make this setting the default.

Every user of zmarkdown is likely impacted, except if disabling LaTeX generation or images download. Here is an example of including an image from an invalid path:

![](/tmp/img.png)

Will effectively redownload and include the image found at /tmp/img.png.

References

  • github.com/advisories/GHSA-mq6v-w35g-3c97
  • github.com/zestedesavoir/zmarkdown
  • github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-mq6v-w35g-3c97

Code Behaviors & Features

Detect and mitigate GHSA-mq6v-w35g-3c97 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.1.3

Fixed versions

  • 10.1.3

Solution

Upgrade to version 10.1.3 or above.

Source file

npm/zmarkdown/GHSA-mq6v-w35g-3c97.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.