CVE-2025-32953 (GCVE-0-2025-32953)
Vulnerability from cvelistv5
Published
2025-04-18 20:42
Modified
2025-04-21 02:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32953",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-21T02:49:00.432455Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-21T02:49:18.601Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "z80pack",
"vendor": "udo-munk",
"versions": [
{
"status": "affected",
"version": "\u003c bd95916"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-18T20:42:46.655Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q"
},
{
"name": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da"
},
{
"name": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d"
},
{
"name": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91"
},
{
"name": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15"
}
],
"source": {
"advisory": "GHSA-gpjj-f76m-9x3q",
"discovery": "UNKNOWN"
},
"title": "z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-32953",
"datePublished": "2025-04-18T20:42:46.655Z",
"dateReserved": "2025-04-14T21:47:11.451Z",
"dateUpdated": "2025-04-21T02:49:18.601Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-32953\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-04-18T21:15:44.087\",\"lastModified\":\"2025-04-21T14:23:45.950\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.\"},{\"lang\":\"es\",\"value\":\"z80pack es un emulador maduro para m\u00faltiples plataformas con CPU 8080 y Z80. En la versi\u00f3n 1.38 y anteriores, el archivo de flujo de trabajo `makefile-ubuntu.yml` usa `actions/upload-artifact@v4` para cargar el artefacto `z80pack-ubuntu`. Este artefacto es un archivo zip del directorio actual, que incluye el archivo `.git/config` generado autom\u00e1ticamente con el GITHUB_TOKEN de la ejecuci\u00f3n. Dado que el artefacto se puede descargar antes de finalizar el flujo de trabajo, hay unos segundos en los que un atacante puede extraer el token del artefacto y usarlo con la API de Github para enviar c\u00f3digo malicioso o reescribir las confirmaciones de lanzamiento en el repositorio. Este problema se ha corregido en el commit bd95916.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"references\":[{\"url\":\"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-32953\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-21T02:49:00.432455Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-21T02:49:13.158Z\"}}], \"cna\": {\"title\": \"z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact\", \"source\": {\"advisory\": \"GHSA-gpjj-f76m-9x3q\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"udo-munk\", \"product\": \"z80pack\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c bd95916\"}]}], \"references\": [{\"url\": \"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\", \"name\": \"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\", \"name\": \"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\", \"name\": \"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\", \"name\": \"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\", \"name\": \"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-04-18T20:42:46.655Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-32953\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-21T02:49:18.601Z\", \"dateReserved\": \"2025-04-14T21:47:11.451Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-04-18T20:42:46.655Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…