Описание
@actions/artifact has an Arbitrary File Write via artifact extraction
Impact
Versions of actions/artifact before 2.1.7 are vulnerable to arbitrary file write when using downloadArtifactInternal, downloadArtifactPublic, or streamExtractExternal for extracting a specifically crafted artifact that contains path traversal filenames.
Patches
Upgrade to version 2.1.7 or higher.
References
CVE
CVE-2024-42471
Credits
Justin Taft from Google
Ссылки
- https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3
- https://nvd.nist.gov/vuln/detail/CVE-2024-42471
- https://github.com/actions/toolkit/pull/1602
- https://github.com/actions/toolkit/pull/1666
- https://github.com/actions/toolkit/pull/1724
- https://github.com/actions/toolkit/commit/29885a805ef3e95a9862dcaa8431c30981960017
- https://github.com/actions/download-artifact/blob/v3/package.json#L31
- https://snyk.io/research/zip-slip-vulnerability
Пакеты
@actions/artifact
>= 2.0.0, < 2.1.2
2.1.2
Связанные уязвимости
actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue.