GHSA-cxww-7g56-2vh6: @actions/download-artifact has an Arbitrary File Write via artifact extraction
7.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/3/2024
Updated
1/22/2025
KEV Status
No
Technology
GitHub Actions
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
actions/download-artifact | actions | >= 4.0.0, < 4.1.3 | 4.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path validation during artifact extraction. The advisory references the Zip Slip vulnerability pattern (CWE-22) and links to fixes in @actions/artifact
. The functions downloadArtifactInternal
, downloadArtifactPublic
, and streamExtractExternal
in the @actions/artifact
package (a dependency of actions/download-artifact
) were identified as vulnerable. These functions handle artifact downloading and extraction without proper path sanitization, allowing path traversal. The confidence is high as the advisory explicitly mentions these functions and their fixes in the patched versions.