Command Injection Affecting asciidoctor-include-ext package, versions <0.4.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.94% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ASCIIDOCTORINCLUDEEXT-2438397
  • published1 Apr 2022
  • disclosed31 Mar 2022
  • creditUnknown

Introduced: 31 Mar 2022

CVE-2022-24803  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade asciidoctor-include-ext to version 0.4.0 or higher.

Overview

asciidoctor-include-ext is a reimplementation of the Asciidoctor's built-in (pre)processor for the include::[] directive in extensible and more clean way.

Affected versions of this package are vulnerable to Command Injection. Applications using Asciidoctor with asciidoctor-include-ext, which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when allow-uri-read is disabled.

CVSS Scores

version 3.1