Skip to content

Releases: zestedesavoir/zmarkdown

[email protected]

29 Mar 08:39
Compare
Choose a tag to compare
  • Security (RCE) : forbid any \end{CodeBlock} command from inside CodeBlocks themselves (included in ZMarkdown 10.1.3)
  • Important : Align table headers left instead of centered

[email protected]

29 Mar 08:38
Compare
Choose a tag to compare

Security fixes

  • Security (RCE) : filter the authorized math commands to a given list
  • Security (RCE) : escape the content of abbreviations

Miscellaneous

  • Important : Align table headers left instead of centered
  • Important : Restore a nice formatting for footnotes
  • Minor : Restore a correct behavior for footnotes, but remove linking
  • Minor : Fix tables column width so that tables take the whole page

[email protected]

30 Aug 10:09
Compare
Choose a tag to compare

This release fixes three security breaches. Please update as soon as possible.

Critical RCE in rebber that affected zmarkdown

A Remote Command Execution vulnerability was found in the rebber module,
which allowed execution of arbitrary commands. The reported problem came
from CodeBlocks, which could be escaped to insert malicious LaTeX.

The mitigation involves forbidding any \end{CodeBlock} command from
inside code blocks themselves. This vulnerability impact is critical, as it allows
Remote Code Execution.

Minor LFI in remark-download-images that affected zmarkdown

A minor Local File Inclusion vulnerability has been found in
remark-download-images, which allowed for images with a known path on
the host machine to be included inside a LaTeX document.

To prevent it, a new option has been created that allow to replace
invalid paths with a default image instead of linking the image on the
host directly. This option is now enabled inside zmarkdown.
This vulnerability impact is minor, as it is restricted to images and
one need to know the path of the image to exploit it.

Major blind SSRF in remark-download-images that affected zmarkdown

A major blind SSRF has been found in remark-images-download, which allowed
for requests to be made to neighboring servers on local IP ranges.
The issue came from a loose filtering of URLs inside the module.

It has been corrected by preventing images downloads from
local IP ranges, both in IPv4 and IPv6.
To avoid malicious domain names, resolved local IPs from are also
forbidden inside the module.
This vulnerability impact is major, as it is can allow access to
unexposed documents on the local network, and is very easy
to exploit..

[email protected]

30 Aug 10:14
Compare
Choose a tag to compare

This release fixes a security breach. Please update as soon as possible.

  • [MINOR] Add an option defaultOn.invalidPath that replaces image by default when it's path is found invalid
  • [BUGFIX] Fix a major SSRF vulnerability

Major blind SSRF in remark-download-images

A major blind SSRF has been found in remark-images-download, which allowed
for requests to be made to neighboring servers on local IP ranges.
The issue came from a loose filtering of URLs inside the module.

It has been corrected by preventing images downloads from
local IP ranges, both in IPv4 and IPv6.
To avoid malicious domain names, resolved local IPs from are also
forbidden inside the module.
This vulnerability impact is major, as it is can allow access to
unexposed documents on the local network, and is very easy
to exploit.

[email protected]

30 Aug 10:12
Compare
Choose a tag to compare

This release fixes a security breaches. Please update as soon as possible.

A Remote Command Execution vulnerability was found in the rebber module,
which allowed execution of arbitrary commands. The reported problem came
from CodeBlocks, which could be escaped to insert malicious LaTeX.

The mitigation involves forbidding any \end{CodeBlock} command from
inside code blocks themselves. This vulnerability impact is critical, as it allows
potential Remote Code Execution.

[email protected]

30 Aug 10:11
Compare
Choose a tag to compare

Contains fixes from the update of rebber

[email protected]

22 Jun 13:55
Compare
Choose a tag to compare
  • Downgrade KaTeX to version 0.11.1 because the new version was causing problems.

[email protected]

09 Mar 19:10
Compare
Choose a tag to compare

[BUGFIX] [ #432 ] Fix footnotes random postfix: every postfix generated was unique, causing mismatch between definition and reference

[email protected]

09 Mar 19:10
Compare
Choose a tag to compare

[BUGFIX] [ #432 ] Fix footnotes random postfix: every postfix generated was unique, causing mismatch between definition and reference

[email protected]

06 Mar 18:04
Compare
Choose a tag to compare

Backport of #431 to ZMarkdown v9.1.4: fix footnotes random postfix