Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. zmarkdown
  4. ›
  5. GMS-2024-74

GMS-2024-74: Local File Inclusion vulnerability in zmarkdown

February 3, 2024

Impact

A minor Local File Inclusion vulnerability has been found in zmarkdown, which allowed for images with a known path on the host machine to be included inside a LaTeX document.

To prevent it, a new option has been created that allow to replace invalid paths with a default image instead of linking the image on the host directly. zmarkdown has been updated to make this setting the default.

Every user of zmarkdown is likely impacted, except if disabling LaTeX generation or images download. Here is an example of including an image from an invalid path:

![](/tmp/img.png)

Will effectively redownload and include the image found at /tmp/img.png.

Patches

The vulnerability has been patched in version 10.1.3. If impacted, you should update to this version as soon as possible.

Workarounds

Disable images downloading, or sanitize paths.

For more information

If you have any questions or comments about this advisory, open an issue in ZMarkdown.

References

  • github.com/advisories/GHSA-mq6v-w35g-3c97
  • github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-mq6v-w35g-3c97

Code Behaviors & Features

Detect and mitigate GMS-2024-74 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.1.3

Fixed versions

  • 10.1.3

Solution

Upgrade to version 10.1.3 or above.

Source file

npm/zmarkdown/GMS-2024-74.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:45 +0000.