CVE-2024-42471: @actions/artifact has an Arbitrary File Write via artifact extraction
Versions of actions/artifact
before 2.1.7 are vulnerable to arbitrary file write when using downloadArtifactInternal
, downloadArtifactPublic
, or streamExtractExternal
for extracting a specifically crafted artifact that contains path traversal filenames.
References
- github.com/actions/toolkit
- github.com/actions/toolkit/commit/29885a805ef3e95a9862dcaa8431c30981960017
- github.com/actions/toolkit/pull/1724
- github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3
- github.com/advisories/GHSA-6q32-hq47-5qq3
- nvd.nist.gov/vuln/detail/CVE-2024-42471
- snyk.io/research/zip-slip-vulnerability
Detect and mitigate CVE-2024-42471 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →