First published: Mon Sep 02 2024(Updated: )
### Impact Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. ### Patches Upgrade to version 2.1.7 or higher. ### References - https://snyk.io/research/zip-slip-vulnerability - https://github.com/actions/toolkit/pull/1724 ### CVE CVE-2024-42471 ### Credits Justin Taft from Google
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@actions/artifact | >=2.0.0<2.1.2 | 2.1.2 |
GitHub Actions | >=2.0.0<2.1.7 | |
GitHub Actions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42471 is regarded as a moderate severity vulnerability due to potential arbitrary file write issues.
To fix CVE-2024-42471, upgrade the @actions/artifact package to version 2.1.7 or later.
CVE-2024-42471 affects versions of the @actions/artifact package before 2.1.7.
CVE-2024-42471 can be exploited through crafted artifacts that utilize path traversal filenames.
Yes, CVE-2024-42471 falls under vulnerabilities associated with GitHub Actions and its toolkit.