Vulnerability Description
actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Github | Actions\/Artifact | >= 2.0.0, < 2.1.7 |
| Github | Actions Toolkit | - |
Related Weaknesses (CWE)
References
- https://github.com/actions/toolkit/pull/1666
- https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3Vendor Advisory
- https://snyk.io/research/zip-slip-vulnerabilityNot Applicable
FAQ
What is CVE-2024-42471?
CVE-2024-42471 is a vulnerability with a CVSS score of 7.3 (HIGH). actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifact...
How severe is CVE-2024-42471?
CVE-2024-42471 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42471?
Check the references section above for vendor advisories and patch information. Affected products include: Github Actions\/Artifact, Github Actions Toolkit.