CVE-2024-42471

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-42471
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42471.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42471
Aliases
Published
2024-09-02T16:13:50Z
Modified
2025-10-13T04:36:10Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Arbitrary File Write via artifact extraction in actions/artifact
Details

actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of actions/artifact on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using downloadArtifactInternal, downloadArtifactPublic, or streamExtractExternal for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue.

References

Affected packages

Git /

Affected ranges

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42471.json"

unresolved_versions

[
    {
        "events": [
            {
                "introduced": "2.0.0"
            },
            {
                "fixed": "2.1.2"
            }
        ],
        "type": ""
    }
]