You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
@actions/artifact has an Arbitrary File Write via artifact extraction
High severity
GitHub Reviewed
Published
Sep 2, 2024
in
actions/toolkit
•
Updated Sep 4, 2024
Versions of actions/artifact before 2.1.7 are vulnerable to arbitrary file write when using downloadArtifactInternal, downloadArtifactPublic, or streamExtractExternal for extracting a specifically crafted artifact that contains path traversal filenames.
Impact
Versions of
actions/artifact
before 2.1.7 are vulnerable to arbitrary file write when usingdownloadArtifactInternal
,downloadArtifactPublic
, orstreamExtractExternal
for extracting a specifically crafted artifact that contains path traversal filenames.Patches
Upgrade to version 2.1.7 or higher.
References
CVE
CVE-2024-42471
Credits
Justin Taft from Google
References