CVE-2024-42471 – @actions/artifact
Package
Manager: npm
Name: @actions/artifact
Vulnerable Version: >=2.0.0 <2.1.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01067 pctl0.76868
Details
@actions/artifact has an Arbitrary File Write via artifact extraction ### Impact Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. ### Patches Upgrade to version 2.1.7 or higher. ### References - https://snyk.io/research/zip-slip-vulnerability - https://github.com/actions/toolkit/pull/1724 ### CVE CVE-2024-42471 ### Credits Justin Taft from Google
Metadata
Created: 2024-09-03T20:08:30Z
Modified: 2025-01-22T18:44:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-6q32-hq47-5qq3/GHSA-6q32-hq47-5qq3.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-6q32-hq47-5qq3
Finding: F063
Auto approve: 1