CVE-2024-54132

EUVD-2024-3409
The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
GitHub_MCNA
6.3 MEDIUM
NETWORK
HIGH
NONE
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/U:Green
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
cli_projectcli
𝑥
< 2.63.1
CNA
Debian logo
Debian Releases
Debian Product
Codename
gh
bookworm
no-dsa
sid
2.46.0-4
fixed
trixie
2.46.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gh
focal
dne
jammy
needs-triage
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage