actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Github
Github actions\/artifact Github actions Toolkit |
|
CPEs | cpe:2.3:a:github:actions\/artifact:*:*:*:*:*:node.js:*:* cpe:2.3:a:github:actions_toolkit:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Github
Github actions\/artifact Github actions Toolkit |
Tue, 03 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Actions\/artifact\/
Actions\/artifact\/ github Toolkit |
|
CPEs | cpe:2.3:a:actions\/artifact\/:github_toolkit:*:*:*:*:*:*:*:* | |
Vendors & Products |
Actions\/artifact\/
Actions\/artifact\/ github Toolkit |
|
Metrics |
ssvc
|
Mon, 02 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. | |
Title | Arbitrary File Write via artifact extraction in actions/artifact | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-02T16:13:50.712Z
Updated: 2024-09-03T14:11:26.139Z
Reserved: 2024-08-02T14:13:04.615Z
Link: CVE-2024-42471
Vulnrichment
Updated: 2024-09-03T14:11:11.507Z
NVD
Status : Analyzed
Published: 2024-09-02T18:15:35.540
Modified: 2024-09-16T16:18:09.597
Link: CVE-2024-42471
Redhat
No data.