Arbitrary File Read The advisory has been revoked - it doesn't affect any version of package jekyll Open this link in a new tab


    Threat Intelligence

    EPSS 0.29% (69th percentile)
Expand this section
NVD
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-JEKYLL-72417
  • published 3 Oct 2018
  • disclosed 19 Sep 2018
  • credit Unknown

How to fix?

Upgrade jekyll to version 3.6.3, 3.7.4, 3.8.4 or higher.

Amendment

This was deemed not a vulnerability.

Overview

jekyll is a web framework for building static websites.

Affected versions of this package are vulnerable to Arbitrary File Read. Jekyll is a simple, blog aware, static site generator.

Affected versions of this package are vulnerable to Arbitrary File Read. A malicious user could access arbitrary files by specifying a symlink in the include key via the _config.yml file.

References