Arbitrary File Read The advisory has been revoked - it doesn't affect any version of package jekyll Open this link in a new tab
Threat Intelligence
EPSS
0.29% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-JEKYLL-72417
- published 3 Oct 2018
- disclosed 19 Sep 2018
- credit Unknown
Introduced: 19 Sep 2018
CVE-2018-17567 Open this link in a new tabHow to fix?
Upgrade jekyll
to version 3.6.3, 3.7.4, 3.8.4 or higher.
Amendment
This was deemed not a vulnerability.
Overview
jekyll is a web framework for building static websites.
Affected versions of this package are vulnerable to Arbitrary File Read. Jekyll is a simple, blog aware, static site generator.
Affected versions of this package are vulnerable to Arbitrary File Read. A malicious user could access arbitrary files by specifying a symlink in the include
key via the _config.yml
file.