Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jekyll/jekyll/pull/7224 - Patch, Third Party Advisory | |
References | () https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/ - Patch, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984%40%3Ccommits.accumulo.apache.org%3E - |
07 Nov 2023, 02:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-09-28 00:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17567
Mitre link : CVE-2018-17567
CVE.ORG link : CVE-2018-17567
JSON object : View
Products Affected
jekyllrb
- jekyll
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')