act project allows path traversal in /upload and /artifact endpoints, leading to remote code execution(CVE-2023-22726)
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2023-22726 Unrestricted file upload leading to privilege escalation in act | 20 Jan 202321:02 | – | cvelist |
![]() | GO-2023-1504 act vulnerable to arbitrary file upload in artifact server in github.com/nektos/act | 20 Aug 202420:25 | – | osv |
![]() | act vulnerable to arbitrary file upload in artifact server | 20 Jan 202316:00 | – | osv |
![]() | CVE-2023-22726 | 20 Jan 202322:15 | – | osv |
![]() | CVE-2023-22726 | 20 Jan 202322:15 | – | nvd |
![]() | CVE-2023-22726 Unrestricted file upload leading to privilege escalation in act | 20 Jan 202321:02 | – | vulnrichment |
![]() | Path traversal | 20 Jan 202322:15 | – | prion |
![]() | Privilege Escalation | 26 Jan 202315:55 | – | veracode |
![]() | act vulnerable to arbitrary file upload in artifact server | 20 Jan 202316:00 | – | github |
[
{
"vendor": "nektos",
"product": "act",
"versions": [
{
"version": "< 0.2.40",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo