Search criteria

2 vulnerabilities found for z80pack by udo-munk

CVE-2025-32953 (GCVE-0-2025-32953)

Vulnerability from cvelistv5 – Published: 2025-04-18 20:42 – Updated: 2025-04-21 02:49
VLAI?
Title
z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact
Summary
z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
udo-munk z80pack Affected: < bd95916
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32953",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-21T02:49:00.432455Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-21T02:49:18.601Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "z80pack",
          "vendor": "udo-munk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c bd95916"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-18T20:42:46.655Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15"
        }
      ],
      "source": {
        "advisory": "GHSA-gpjj-f76m-9x3q",
        "discovery": "UNKNOWN"
      },
      "title": "z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-32953",
    "datePublished": "2025-04-18T20:42:46.655Z",
    "dateReserved": "2025-04-14T21:47:11.451Z",
    "dateUpdated": "2025-04-21T02:49:18.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32953 (GCVE-0-2025-32953)

Vulnerability from nvd – Published: 2025-04-18 20:42 – Updated: 2025-04-21 02:49
VLAI?
Title
z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact
Summary
z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
udo-munk z80pack Affected: < bd95916
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32953",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-21T02:49:00.432455Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-21T02:49:18.601Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "z80pack",
          "vendor": "udo-munk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c bd95916"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-18T20:42:46.655Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15"
        }
      ],
      "source": {
        "advisory": "GHSA-gpjj-f76m-9x3q",
        "discovery": "UNKNOWN"
      },
      "title": "z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-32953",
    "datePublished": "2025-04-18T20:42:46.655Z",
    "dateReserved": "2025-04-14T21:47:11.451Z",
    "dateUpdated": "2025-04-21T02:49:18.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}