Количество 6
Количество 6
CVE-2024-54132
The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.
CVE-2024-54132
The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.
CVE-2024-54132
GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability
CVE-2024-54132
The GitHub CLI is GitHub\u2019s official command line tool. A security ...
GHSA-2m9h-r57g-45pj
Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability
BDU:2024-11233
Уязвимость интерфейса командной строки CLI платформы для совместной разработки GitHub, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-54132 The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1. | 0% Низкий | 12 месяцев назад | ||
CVE-2024-54132 The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1. | 0% Низкий | 12 месяцев назад | ||
CVE-2024-54132 GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability | 0% Низкий | 11 месяцев назад | ||
CVE-2024-54132 The GitHub CLI is GitHub\u2019s official command line tool. A security ... | 0% Низкий | 12 месяцев назад | ||
GHSA-2m9h-r57g-45pj Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability | 0% Низкий | 12 месяцев назад | ||
BDU:2024-11233 Уязвимость интерфейса командной строки CLI платформы для совместной разработки GitHub, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов | CVSS3: 3.7 | 0% Низкий | 12 месяцев назад |
Уязвимостей на страницу