CVE-2024-54132

The GitHub CLI is GitHubs official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifacts download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
UNKNOWN
---
GitHub_MCNA
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
Debian logo
Debian Releases
Debian Product
Codename
gh
bookworm
no-dsa
forky
2.46.0-3
fixed
sid
2.46.0-3
fixed
trixie
2.46.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gh
questing
needs-triage
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
needs-triage
focal
dne