A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md | Broken Link |
https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4 | Broken Link |
https://vuldb.com/?ctiid.274358 | Permissions Required |
https://vuldb.com/?id.274358 | Third Party Advisory |
https://vuldb.com/?submit.385634 | Third Party Advisory |
Configurations
History
02 Sep 2025, 13:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yzane:markdown_pdf:1.5.0:*:*:*:*:visual_studio_code:*:* |
Information
Published : 2024-08-13 19:15
Updated : 2025-09-02 13:10
NVD link : CVE-2024-7738
Mitre link : CVE-2024-7738
CVE.ORG link : CVE-2024-7738
JSON object : View
Products Affected
yzane
- markdown_pdf