@actions/download-artifact has an Arbitrary File Write via artifact extraction
        
  High severity
        
          GitHub Reviewed
      
        Published
          Sep 2, 2024 
          in
          
            actions/download-artifact
          
          •
          Updated Jan 22, 2025 
      
  
Package
Affected versions
>= 4.0.0, < 4.1.3
  Patched versions
4.1.3
  Description
        Published to the GitHub Advisory Database
      Sep 3, 2024 
    
  
        Reviewed
      Sep 3, 2024 
    
  
        Last updated
      Jan 22, 2025 
    
  
Impact
Versions of
actions/download-artifactbefore 4.1.3 are vulnerable to arbitrary file write when downloading and extracting a specifically crafted artifact that contains path traversal filenames.Patches
Upgrade to version 4.1.3 or higher. Alternatively use 'v4' tag which points to the latest and secure version.
References
CVE
CVE-2024-42471
Credits
Justin Taft from Google
References