Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-54132

Опубликовано: 04 дек. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

РелизСтатусПримечание
devel

not-affected

2.46.0-4
esm-apps/jammy

not-affected

vulnerable code not present
esm-apps/noble

released

2.45.0-1ubuntu0.3+esm2
esm-infra/focal

DNE

focal

DNE

jammy

not-affected

vulnerable code not present
noble

needed

oracular

ignored

end of life, was needs-triage
plucky

ignored

end of life, was needs-triage
questing

not-affected

2.46.0-3

Показывать по

EPSS

Процентиль: 49%
0.00257
Низкий

Связанные уязвимости

nvd
около 1 года назад

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

msrc
около 1 года назад

GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability

debian
около 1 года назад

The GitHub CLI is GitHub\u2019s official command line tool. A security ...

github
около 1 года назад

Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability

CVSS3: 3.7
fstec
около 1 года назад

Уязвимость интерфейса командной строки CLI платформы для совместной разработки GitHub, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

EPSS

Процентиль: 49%
0.00257
Низкий