CVE-2025-32953 (GCVE-0-2025-32953)

Vulnerability from cvelistv5 – Published: 2025-04-18 20:42 – Updated: 2025-04-21 02:49
VLAI?
Title
z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact
Summary
z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
udo-munk z80pack Affected: < bd95916
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32953",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-21T02:49:00.432455Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-21T02:49:18.601Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "z80pack",
          "vendor": "udo-munk",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c bd95916"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-18T20:42:46.655Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91"
        },
        {
          "name": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15"
        }
      ],
      "source": {
        "advisory": "GHSA-gpjj-f76m-9x3q",
        "discovery": "UNKNOWN"
      },
      "title": "z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-32953",
    "datePublished": "2025-04-18T20:42:46.655Z",
    "dateReserved": "2025-04-14T21:47:11.451Z",
    "dateUpdated": "2025-04-21T02:49:18.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-32953\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-04-18T21:15:44.087\",\"lastModified\":\"2025-04-21T14:23:45.950\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.\"},{\"lang\":\"es\",\"value\":\"z80pack es un emulador maduro para m\u00faltiples plataformas con CPU 8080 y Z80. En la versi\u00f3n 1.38 y anteriores, el archivo de flujo de trabajo `makefile-ubuntu.yml` usa `actions/upload-artifact@v4` para cargar el artefacto `z80pack-ubuntu`. Este artefacto es un archivo zip del directorio actual, que incluye el archivo `.git/config` generado autom\u00e1ticamente con el GITHUB_TOKEN de la ejecuci\u00f3n. Dado que el artefacto se puede descargar antes de finalizar el flujo de trabajo, hay unos segundos en los que un atacante puede extraer el token del artefacto y usarlo con la API de Github para enviar c\u00f3digo malicioso o reescribir las confirmaciones de lanzamiento en el repositorio. Este problema se ha corregido en el commit bd95916.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"references\":[{\"url\":\"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-32953\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-21T02:49:00.432455Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-21T02:49:13.158Z\"}}], \"cna\": {\"title\": \"z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact\", \"source\": {\"advisory\": \"GHSA-gpjj-f76m-9x3q\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"udo-munk\", \"product\": \"z80pack\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c bd95916\"}]}], \"references\": [{\"url\": \"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\", \"name\": \"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\", \"name\": \"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\", \"name\": \"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\", \"name\": \"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\", \"name\": \"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run\u0027s GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-04-18T20:42:46.655Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-32953\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-21T02:49:18.601Z\", \"dateReserved\": \"2025-04-14T21:47:11.451Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-04-18T20:42:46.655Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…