Miggo Logo

GHSA-cxww-7g56-2vh6: @actions/download-artifact has an Arbitrary File Write via artifact extraction

7.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
9/3/2024
Updated
1/22/2025
KEV Status
No
Technology
TechnologyGitHub Actions

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
actions/download-artifactactions>= 4.0.0, < 4.1.34.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path validation during artifact extraction. The advisory references the Zip Slip vulnerability pattern (CWE-22) and links to fixes in @actions/artifact. The functions downloadArtifactInternal, downloadArtifactPublic, and streamExtractExternal in the @actions/artifact package (a dependency of actions/download-artifact) were identified as vulnerable. These functions handle artifact downloading and extraction without proper path sanitization, allowing path traversal. The confidence is high as the advisory explicitly mentions these functions and their fixes in the patched versions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t V*rsions o* `**tions/*ownlo**-*rti***t` ***or* *.*.* *r* vuln*r**l* to *r*itr*ry *il* writ* w**n *ownlo**in* *n* *xtr**tin* * sp**i*i**lly *r**t** *rti***t t**t *ont*ins p*t* tr*v*rs*l *il*n*m*s. ### P*t***s Up*r*** to v*rsion *.*.* or

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* v*li**tion *urin* *rti***t *xtr**tion. T** **visory r***r*n**s t** Zip Slip vuln*r**ility p*tt*rn (*W*-**) *n* links to *ix*s in `@**tions/*rti***t`. T** *un*tions `*ownlo***rti***tInt*rn*l`, `*ownlo***rti**