gollum 1.4.2

2 security vulnerabilities found in version 1.4.2

gollum and gollum-lib allow remote authenticated users to execute arbitrary code

high severity CVE-2014-9489
high severity CVE-2014-9489
Patched versions: >= 3.1.1

The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string master is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.

gollum Upload File Functionality Permits Arbitrary File Access

medium severity CVE-2015-7314
medium severity CVE-2015-7314
Patched versions: >= 4.0.1

The gollum gem contains a flaw in its upload file functionality that can allow arbitrary file access. This occurs due to a lack of type checking when handling temporary files during the upload process.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.