Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-2E2364AACAB9BFDE40EE9177107CDF53
HistorySep 03, 2024 - 12:00 a.m.

@actions/artifact has an Arbitrary File Write via artifact extraction

2024-09-0300:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
2
arbitrary file write
artifact extraction
path traversal
vulnerability
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

21.9%

Versions of actions/artifact before 2.1.7 are vulnerable to arbitrary file write when using downloadArtifactInternal, downloadArtifactPublic, or streamExtractExternal for extracting a specifically crafted artifact that contains path traversal filenames.

Affected configurations

Vulners
Node
npmartifactRange<2.1.7
VendorProductVersionCPE
npmartifact*cpe:2.3:a:npm:artifact:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

21.9%

Related for GITLAB-2E2364AACAB9BFDE40EE9177107CDF53