{"vulnerability": "CVE-2024-42471", "sightings": [{"uuid": "7e89d74f-b4f0-47f9-b354-c77b360e0835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lnznwmre3m2o", "content": "", "creation_timestamp": "2025-04-30T11:11:08.467725Z"}, {"uuid": "f8f86f6f-8481-4806-befe-df3daf89228d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2571", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42471\n\ud83d\udd39 Description: actions/artifact is the GitHub ToolKit for developing GitHub Actions.  Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue.\n\ud83d\udccf Published: 2024-09-02T16:13:50.712Z\n\ud83d\udccf Modified: 2025-01-22T15:12:27.332Z\n\ud83d\udd17 References:\n1. https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3\n2. https://github.com/actions/toolkit/pull/1724\n3. https://snyk.io/research/zip-slip-vulnerability", "creation_timestamp": "2025-01-22T16:02:00.000000Z"}, {"uuid": "05eb7d2a-bf62-4b19-940b-98539a763d2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://t.me/cvedetector/4654", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42471 - GitHub Actions Artifact Path Traversal Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42471 \nPublished : Sept. 2, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : actions/artifact is the GitHub ToolKit for developing GitHub Actions.  Versions of `actions/artifact` before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T21:24:29.000000Z"}, {"uuid": "0fb6626a-2ce2-4b66-b5fb-bea4bc4b8578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "published-proof-of-concept", "source": "Telegram/hru7NN7EYI-xT4JmOnsEkxtF0d6B0YZMLzams5CbWl1Ym4s", "content": "", "creation_timestamp": "2025-04-24T23:00:06.000000Z"}, {"uuid": "87fd80b1-bca6-4ca5-87ef-f9a4106fa86e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42471", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lo57i2ki3z2p", "content": "", "creation_timestamp": "2025-05-01T21:03:07.538287Z"}]}