Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-54132

Опубликовано: 04 дек. 2024
Источник: debian
EPSS Низкий

Описание

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ghfixed2.46.0-3package
ghno-dsabookwormpackage

Примечания

  • https://github.com/cli/cli/security/advisories/GHSA-2m9h-r57g-45pj

  • Merge commit: https://github.com/cli/cli/commit/1136764c369aaf0cae4ec2ee09dc35d871076932 (v2.63.1)

EPSS

Процентиль: 49%
0.00282
Низкий

Связанные уязвимости

ubuntu
12 месяцев назад

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

nvd
12 месяцев назад

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

msrc
11 месяцев назад

GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability

github
12 месяцев назад

Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability

CVSS3: 3.7
fstec
12 месяцев назад

Уязвимость интерфейса командной строки CLI платформы для совместной разработки GitHub, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

EPSS

Процентиль: 49%
0.00282
Низкий