Hii
The GitHub Actions workflow in the FoXAI repository is using a vulnerable version of actions/download-artifact@v2, which is affected by CVE-2024-42471. This vulnerability allows attackers to exploit artifact extraction to overwrite arbitrary files on the GitHub runner. This could lead to remote code execution, workflow manipulation, or leakage of secrets.
π Vulnerable usage:
FoXAI: publish_docs.yaml#L87

How to reproduce?
- Fork the repository.
- Push a crafted artifact with directory traversal (
../) paths.
- Trigger the
publish_docs workflow.
- Observe file overwrite on the GitHub-hosted runner.
Additional information
-
This vulnerability exists in both @v1 and @v2 of the action.
-
Recommended patch:
Replace the usage with the secure version:
uses: actions/download-artifact@v4
-
Severity: High, especially for public or fork-enabled repositories.
π References: