Arbitrary File Read

Affecting jekyll gem, versions >=3.6.0, <3.6.2 || >=3.7.0, <3.7.4 || >=3.8.0, <3.8.4

Do your applications use this vulnerable package? Test your applications

Overview

Jekyll is a simple, blog aware, static site generator.

Affected versions of this package are vulnerable to Arbitrary File Read. A malicious user could access arbitrary files by specifying a symlink in the include key via the _config.yml file.

Remediation

Upgrade jekyll to version 3.6.3, 3.7.4, 3.8.4 or higher.

References

CVSS Score

7.5
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    High
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Credit
Unknown
CVE
CVE-2018-17567
CWE
CWE-94
Snyk ID
SNYK-RUBY-JEKYLL-72417
Disclosed
19 Sep, 2018
Published
03 Oct, 2018