Directory Traversal Affecting gh package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-GH-8456182
  • published5 Dec 2024
  • disclosed4 Dec 2024

Introduced: 4 Dec 2024

CVE-2024-54132  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 gh.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gh package and not the gh package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The GitHub CLI is GitHub’s official command line tool. A security vulnerability has been identified in GitHub CLI that could create or overwrite files in unintended directories when users download a malicious GitHub Actions workflow artifact through gh run download. This vulnerability stems from a GitHub Actions workflow artifact named .. when downloaded using gh run download. The artifact name and --dir flag are used to determine the artifact’s download path. When the artifact is named .., the resulting files within the artifact are extracted exactly 1 directory higher than the specified --dir flag value. This vulnerability is fixed in 2.63.1.