27 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
			
		
		
	
	
			27 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
---
 | 
						|
layout: news_item
 | 
						|
title: 'Jekyll 1.4.3 Released'
 | 
						|
date: 2014-01-13 17:43:32 -0800
 | 
						|
author: benbalter
 | 
						|
version: 1.4.3
 | 
						|
categories: [release]
 | 
						|
---
 | 
						|
 | 
						|
Jekyll 1.4.3 contains two **critical** security fixes. If you run Jekyll locally
 | 
						|
and do not run Jekyll in "safe" mode (e.g. you do not build Jekyll sites on behalf
 | 
						|
of others), you are not affected and are not required to update at this time.
 | 
						|
([See pull request.]({{ site.repository }}/pull/1944))
 | 
						|
 | 
						|
Versions of Jekyll prior to 1.4.3 and greater than 1.2.0 may allow malicious
 | 
						|
users to expose the content of files outside the source directory in the
 | 
						|
generated output via improper symlink sanitization, potentially resulting in an
 | 
						|
inadvertent information disclosure.
 | 
						|
 | 
						|
Versions of Jekyll prior to 1.4.3 may also allow malicious users to write
 | 
						|
arbitrary `.html` files outside of the destination folder via relative path
 | 
						|
traversal, potentially overwriting otherwise-trusted content with arbitrary HTML
 | 
						|
or Javascript depending on your server's configuration.
 | 
						|
 | 
						|
*Maintainer's note: Many thanks to @gregose and @charliesome for discovering
 | 
						|
these vulnerabilities, and to @BenBalter and @alindeman for writing the patch.*
 |