CVE-2020-15271: Markdown-supplied Shell Command Execution
(updated )
lookatme versions prior to 2.3.0 automatically loaded the built-in “terminal” and “file_loader” extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system.
References
- github.com/advisories/GHSA-c84h-w6cr-5v8q
- github.com/d0c-s4vage/lookatme
- github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84
- github.com/d0c-s4vage/lookatme/pull/110
- github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0
- github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q
- github.com/pypa/advisory-database/tree/main/vulns/lookatme/PYSEC-2020-61.yaml
- nvd.nist.gov/vuln/detail/CVE-2020-15271
- pypi.org/project/lookatme/
Detect and mitigate CVE-2020-15271 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →