{"uuid": "f8f86f6f-8481-4806-befe-df3daf89228d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42471", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2571", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42471\n\ud83d\udd39 Description: actions/artifact is the GitHub ToolKit for developing GitHub Actions.  Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.\n\ud83d\udccf Published: 2024-09-02T16:13:50.712Z\n\ud83d\udccf Modified: 2025-01-22T15:12:27.332Z\n\ud83d\udd17 References:\n1. https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3\n2. https://github.com/actions/toolkit/pull/1724\n3. https://snyk.io/research/zip-slip-vulnerability", "creation_timestamp": "2025-01-22T16:02:00.000000Z"}