@actions/download-artifact has an Arbitrary File Write via artifact extraction
High severity
GitHub Reviewed
Published
Sep 2, 2024
in
actions/download-artifact
•
Updated Jan 22, 2025
Package
Affected versions
>= 4.0.0, < 4.1.3
Patched versions
4.1.3
Description
Published to the GitHub Advisory Database
Sep 3, 2024
Reviewed
Sep 3, 2024
Last updated
Jan 22, 2025
Impact
Versions of
actions/download-artifact
before 4.1.3 are vulnerable to arbitrary file write when downloading and extracting a specifically crafted artifact that contains path traversal filenames.Patches
Upgrade to version 4.1.3 or higher. Alternatively use 'v4' tag which points to the latest and secure version.
References
CVE
CVE-2024-42471
Credits
Justin Taft from Google
References