Lucene search

K
nvd[email protected]NVD:CVE-2024-42471
HistorySep 02, 2024 - 6:15 p.m.

CVE-2024-42471

2024-09-0218:15:35
CWE-22
web.nvd.nist.gov
2
github
toolkit
vulnerability
cve-2024-42471
arbitrary file write
upgrade

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

21.9%

actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of actions/artifact before 2.1.7 are vulnerable to arbitrary file write when using downloadArtifactInternal, downloadArtifactPublic, or streamExtractExternal for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.

Affected configurations

Nvd
Node
githubactions\/artifactRange2.0.02.1.7node.js
Node
githubactions_toolkitMatch-
VendorProductVersionCPE
githubactions\/artifact*cpe:2.3:a:github:actions\/artifact:*:*:*:*:*:node.js:*:*
githubactions_toolkit-cpe:2.3:a:github:actions_toolkit:-:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

21.9%

Related for NVD:CVE-2024-42471