@actions/download-artifact has an Arbitrary File Write via artifact extraction
High severity
GitHub Reviewed
Published
Sep 2, 2024
in
actions/download-artifact
•
Updated Sep 4, 2024
Package
Affected versions
>= 4.0.0, < 4.1.7
Patched versions
4.1.7
Description
Published to the GitHub Advisory Database
Sep 3, 2024
Reviewed
Sep 3, 2024
Last updated
Sep 4, 2024
Impact
Versions of
actions/download-artifact
before 4.1.7 are vulnerable to arbitrary file write when downloading and extracting a specifically crafted artifact that contains path traversal filenames.Patches
Upgrade to version 4.1.7 or higher. Alternatively use 'v4' tag which points to the latest and secure version.
References
CVE
CVE-2024-42471
Credits
Justin Taft from Google
References