actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.
History

Mon, 16 Sep 2024 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Github
Github actions\/artifact
Github actions Toolkit
CPEs cpe:2.3:a:github:actions\/artifact:*:*:*:*:*:node.js:*:*
cpe:2.3:a:github:actions_toolkit:-:*:*:*:*:*:*:*
Vendors & Products Github
Github actions\/artifact
Github actions Toolkit

Tue, 03 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Actions\/artifact\/
Actions\/artifact\/ github Toolkit
CPEs cpe:2.3:a:actions\/artifact\/:github_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Actions\/artifact\/
Actions\/artifact\/ github Toolkit
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Description actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.
Title Arbitrary File Write via artifact extraction in actions/artifact
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-02T16:13:50.712Z

Updated: 2024-09-03T14:11:26.139Z

Reserved: 2024-08-02T14:13:04.615Z

Link: CVE-2024-42471

cve-icon Vulnrichment

Updated: 2024-09-03T14:11:11.507Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-02T18:15:35.540

Modified: 2024-09-16T16:18:09.597

Link: CVE-2024-42471

cve-icon Redhat

No data.