Metrics
Affected Vendors & Products
Thu, 23 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Wed, 22 Jan 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 22 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue. |
References |
|
Wed, 22 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. |
Mon, 16 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Github
Github actions\/artifact Github actions Toolkit |
|
CPEs | cpe:2.3:a:github:actions\/artifact:*:*:*:*:*:node.js:*:* cpe:2.3:a:github:actions_toolkit:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Github
Github actions\/artifact Github actions Toolkit |
Tue, 03 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Actions\/artifact\/
Actions\/artifact\/ github Toolkit |
|
CPEs | cpe:2.3:a:actions\/artifact\/:github_toolkit:*:*:*:*:*:*:*:* | |
Vendors & Products |
Actions\/artifact\/
Actions\/artifact\/ github Toolkit |
|
Metrics |
ssvc
|
Mon, 02 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. | |
Title | Arbitrary File Write via artifact extraction in actions/artifact | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-23T21:42:17.267Z
Reserved: 2024-08-02T14:13:04.615Z
Link: CVE-2024-42471

Updated: 2024-09-03T14:11:11.507Z

Status : Modified
Published: 2024-09-02T18:15:35.540
Modified: 2025-01-23T22:15:13.320
Link: CVE-2024-42471

No data.