Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2m9h-r57g-45pj

Опубликовано: 04 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.3

Описание

Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability

Summary

A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download.

Details

This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value.

In 2.63.1, gh run download will not download artifacts named .. and . and instead exit with the following error message:

error downloading ..: would result in path traversal

Impact

Successful exploitation heightens the risk of local path traversal attack vectors exactly 1 directory higher than intended.

Remediation and Mitigation

  1. Upgrade gh to 2.63.1
  2. Implement additional validation to ensure artifact filenames do not contain potentially dangerous patterns, such as .., to prevent path traversal risks.

Пакеты

Наименование

github.com/cli/cli/v2

go
Затронутые версииВерсия исправления

< 2.63.1

2.63.1

Наименование

github.com/cli/cli

go
Затронутые версииВерсия исправления

<= 1.14.0

Отсутствует

EPSS

Процентиль: 49%
0.00282
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-22

Связанные уязвимости

ubuntu
12 месяцев назад

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

nvd
12 месяцев назад

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

msrc
11 месяцев назад

GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability

debian
12 месяцев назад

The GitHub CLI is GitHub\u2019s official command line tool. A security ...

CVSS3: 3.7
fstec
12 месяцев назад

Уязвимость интерфейса командной строки CLI платформы для совместной разработки GitHub, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

EPSS

Процентиль: 49%
0.00282
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-22