27 lines
1.1 KiB
Markdown
27 lines
1.1 KiB
Markdown
|
---
|
||
|
layout: news_item
|
||
|
title: 'Jekyll 1.4.3 Released'
|
||
|
date: 2014-01-13 17:43:32 -0800
|
||
|
author: benbalter
|
||
|
version: 1.4.3
|
||
|
categories: [release]
|
||
|
---
|
||
|
|
||
|
Jekyll 1.4.3 contains two **critical** security fixes. If you run Jekyll locally
|
||
|
and do not run Jekyll in "safe" mode (e.g. you do not build Jekyll sites on behalf
|
||
|
of others), you are not affected and are not required to update at this time.
|
||
|
([See pull request.]({{ site.repository }}/pull/1944))
|
||
|
|
||
|
Versions of Jekyll prior to 1.4.3 and greater than 1.2.0 may allow malicious
|
||
|
users to expose the content of files outside the source directory in the
|
||
|
generated output via improper symlink sanitization, potentially resulting in an
|
||
|
inadvertent information disclosure.
|
||
|
|
||
|
Versions of Jekyll prior to 1.4.3 may also allow malicious users to write
|
||
|
arbitrary `.html` files outside of the destination folder via relative path
|
||
|
traversal, potentially overwriting otherwise-trusted content with arbitrary HTML
|
||
|
or Javascript depending on your server's configuration.
|
||
|
|
||
|
*Maintainer's note: Many thanks to @gregose and @charliesome for discovering
|
||
|
these vulnerabilities, and to @BenBalter and @alindeman for writing the patch.*
|