We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-54132

GitHub CLI allows downloading malicious GitHub Actions workflow artifact to result in path traversal vulnerability



Description

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.

Reserved 2024-11-29 | Published 2024-12-04 | Updated 2024-12-04 | Assigner GitHub_M


MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/U:Green

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 2.63.1
affected

References

github.com/cli/cli/security/advisories/GHSA-2m9h-r57g-45pj

github.com/...ommit/1136764c369aaf0cae4ec2ee09dc35d871076932

cve.org (CVE-2024-54132)

nvd.nist.gov (CVE-2024-54132)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-54132

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.