All the vulnerabilites related to composer - composer
cve-2023-43655
Vulnerability from cvelistv5
Published
2023-09-29 19:33
Modified
2024-09-23 16:25
Severity ?
EPSS score ?
Summary
Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf" }, { "name": "https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d" }, { "name": "https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c" }, { "name": "https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:docker:composer:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "docker", "versions": [ { "lessThanOrEqual": "2.6.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-43655", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T16:22:54.194704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T16:25:09.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "2.6.4, 2.2.21, 1.10.27" }, { "status": "affected", "version": "\u003e= 2.0, \u003c 2.2.22" }, { "status": "affected", "version": "\u003c 1.10.27" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-29T19:33:32.183Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf" }, { "name": "https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d" }, { "name": "https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c" }, { "name": "https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html" } ], "source": { "advisory": "GHSA-jm6m-4632-36hf", "discovery": "UNKNOWN" }, "title": "Remote Code Execution via web-accessible composer.phar" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-43655", "datePublished": "2023-09-29T19:33:32.183Z", "dateReserved": "2023-09-20T15:35:38.147Z", "dateUpdated": "2024-09-23T16:25:09.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24828
Vulnerability from cvelistv5
Published
2022-04-13 21:00
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
References
▼ | URL | Tags |
---|---|---|
https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6 | x_refsource_CONFIRM | |
https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709 | x_refsource_MISC | |
https://www.tenable.com/security/tns-2022-09 | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/625MT3IKWKFVIWLSYZFSXHVUA2LES7YQ/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-09" }, { "name": "FEDORA-2022-617a6df23e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/" }, { "name": "FEDORA-2022-47d2e7da46", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/" }, { "name": "FEDORA-2022-60ec715192", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/625MT3IKWKFVIWLSYZFSXHVUA2LES7YQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003c 1.10.26" }, { "status": "affected", "version": "\u003e= 2.0.0, \u003c 2.2.12" }, { "status": "affected", "version": "\u003e= 2.3, \u003c 2.3.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json\u0027s `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-07T07:06:21", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2022-09" }, { "name": "FEDORA-2022-617a6df23e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/" }, { "name": "FEDORA-2022-47d2e7da46", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/" }, { "name": "FEDORA-2022-60ec715192", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/625MT3IKWKFVIWLSYZFSXHVUA2LES7YQ/" } ], "source": { "advisory": "GHSA-x7cr-6qr6-2hh6", "discovery": "UNKNOWN" }, "title": "Missing input validation can lead to command execution in composer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24828", "STATE": "PUBLIC", "TITLE": "Missing input validation can lead to command execution in composer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "composer", "version": { "version_data": [ { "version_value": "\u003c 1.10.26" }, { "version_value": "\u003e= 2.0.0, \u003c 2.2.12" }, { "version_value": "\u003e= 2.3, \u003c 2.3.6" } ] } } ] }, "vendor_name": "composer" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json\u0027s `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6", "refsource": "CONFIRM", "url": "https://github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6" }, { "name": "https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709", "refsource": "MISC", "url": "https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709" }, { "name": "https://www.tenable.com/security/tns-2022-09", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-09" }, { "name": "FEDORA-2022-617a6df23e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/" }, { "name": "FEDORA-2022-47d2e7da46", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/" }, { "name": "FEDORA-2022-60ec715192", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/625MT3IKWKFVIWLSYZFSXHVUA2LES7YQ/" } ] }, "source": { "advisory": "GHSA-x7cr-6qr6-2hh6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24828", "datePublished": "2022-04-13T21:00:22", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-29472
Vulnerability from cvelistv5
Published
2021-04-27 20:30
Modified
2024-08-03 22:11
Severity ?
EPSS score ?
Summary
Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx | x_refsource_CONFIRM | |
https://getcomposer.org/ | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4907 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/ | vendor-advisory, x_refsource_FEDORA | |
https://blog.sonarsource.com/php-supply-chain-attack-on-composer/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:11:05.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://getcomposer.org/" }, { "name": "DSA-4907", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4907" }, { "name": "[debian-lts-announce] 20210511 [SECURITY] [DLA 2654-1] composer security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html" }, { "name": "FEDORA-2021-8a098ecbcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/" }, { "name": "FEDORA-2021-ab7d0d3486", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.sonarsource.com/php-supply-chain-attack-on-composer/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003c 1.10.22" }, { "status": "affected", "version": "\u003e=2.0,\u003c2.0.13" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-02T14:18:44", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://getcomposer.org/" }, { "name": "DSA-4907", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4907" }, { "name": "[debian-lts-announce] 20210511 [SECURITY] [DLA 2654-1] composer security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html" }, { "name": "FEDORA-2021-8a098ecbcf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/" }, { "name": "FEDORA-2021-ab7d0d3486", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.sonarsource.com/php-supply-chain-attack-on-composer/" } ], "source": { "advisory": "GHSA-h5h8-pc6h-jvvx", "discovery": "UNKNOWN" }, "title": "Missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial in composer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-29472", "STATE": "PUBLIC", "TITLE": "Missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial in composer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "composer", "version": { "version_data": [ { "version_value": "\u003c 1.10.22" }, { "version_value": "\u003e=2.0,\u003c2.0.13" } ] } } ] }, "vendor_name": "composer" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx", "refsource": "CONFIRM", "url": "https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx" }, { "name": "https://getcomposer.org/", "refsource": "MISC", "url": "https://getcomposer.org/" }, { "name": "DSA-4907", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4907" }, { "name": "[debian-lts-announce] 20210511 [SECURITY] [DLA 2654-1] composer security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html" }, { "name": "FEDORA-2021-8a098ecbcf", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/" }, { "name": "FEDORA-2021-ab7d0d3486", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/" }, { "name": "https://blog.sonarsource.com/php-supply-chain-attack-on-composer/", "refsource": "MISC", "url": "https://blog.sonarsource.com/php-supply-chain-attack-on-composer/" } ] }, "source": { "advisory": "GHSA-h5h8-pc6h-jvvx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-29472", "datePublished": "2021-04-27T20:30:15", "dateReserved": "2021-03-30T00:00:00", "dateUpdated": "2024-08-03T22:11:05.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-35241
Vulnerability from cvelistv5
Published
2024-06-10 21:19
Modified
2024-08-02 03:07
Severity ?
EPSS score ?
Summary
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using `--prefer-dist` or the `preferred-install: dist` config setting.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "39" }, { "status": "affected", "version": "40" } ] }, { "cpes": [ "cpe:2.3:a:getcomposer:composer:2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "getcomposer", "versions": [ { "lessThan": "2.2.24", "status": "affected", "version": "2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:getcomposer:composer:2.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "getcomposer", "versions": [ { "lessThan": "2.7.7", "status": "affected", "version": "2.3", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-35241", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T20:42:58.759423Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T20:43:01.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:07:46.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c" }, { "name": "https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b67d4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b67d4" }, { "name": "https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f68704", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f68704" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003e= 2.0, \u003c 2.2.24" }, { "status": "affected", "version": "\u003e= 2.3, \u003c 2.7.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using `--prefer-dist` or the `preferred-install: dist` config setting.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T21:19:47.123Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c" }, { "name": "https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b67d4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b67d4" }, { "name": "https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f68704", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f68704" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/" } ], "source": { "advisory": "GHSA-47f6-5gq3-vx9c", "discovery": "UNKNOWN" }, "title": "Composer vulnerable to command injection via malicious git branch name" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-35241", "datePublished": "2024-06-10T21:19:47.123Z", "dateReserved": "2024-05-14T15:39:41.786Z", "dateUpdated": "2024-08-02T03:07:46.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24821
Vulnerability from cvelistv5
Published
2024-02-08 23:54
Modified
2024-08-01 23:28
Severity ?
EPSS score ?
Summary
Composer is a dependency Manager for the PHP language. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. All Composer CLI commands are affected, including composer.phar's self-update. The following scenarios are of high risk: Composer being run with sudo, Pipelines which may execute Composer on untrusted projects, Shared environments with developers who run Composer individually on the same project. This vulnerability has been addressed in versions 2.7.0 and 2.2.23. It is advised that the patched versions are applied at the earliest convenience. Where not possible, the following should be addressed: Remove all sudo composer privileges for all users to mitigate root privilege escalation, and avoid running Composer within an untrusted directory, or if needed, verify that the contents of `vendor/composer/InstalledVersions.php` and `vendor/composer/installed.php` do not include untrusted code. A reset can also be done on these files by the following:```sh
rm vendor/composer/installed.php vendor/composer/InstalledVersions.php
composer install --no-scripts --no-plugins
```
References
▼ | URL | Tags |
---|---|---|
https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h | x_refsource_CONFIRM | |
https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h" }, { "name": "https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003e= 2.0, \u003c 2.2.23" }, { "status": "affected", "version": "\u003e= 2.3, \u003c 2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency Manager for the PHP language. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. All Composer CLI commands are affected, including composer.phar\u0027s self-update. The following scenarios are of high risk: Composer being run with sudo, Pipelines which may execute Composer on untrusted projects, Shared environments with developers who run Composer individually on the same project. This vulnerability has been addressed in versions 2.7.0 and 2.2.23. It is advised that the patched versions are applied at the earliest convenience. Where not possible, the following should be addressed: Remove all sudo composer privileges for all users to mitigate root privilege escalation, and avoid running Composer within an untrusted directory, or if needed, verify that the contents of `vendor/composer/InstalledVersions.php` and `vendor/composer/installed.php` do not include untrusted code. A reset can also be done on these files by the following:```sh\nrm vendor/composer/installed.php vendor/composer/InstalledVersions.php\ncomposer install --no-scripts --no-plugins\n```" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-829", "description": "CWE-829: Inclusion of Functionality from Untrusted Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-08T23:54:04.058Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h" }, { "name": "https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5" } ], "source": { "advisory": "GHSA-7c6p-848j-wh5h", "discovery": "UNKNOWN" }, "title": "Code execution and possible privilege escalation via compromised InstalledVersions.php or installed.php in Composer" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24821", "datePublished": "2024-02-08T23:54:04.058Z", "dateReserved": "2024-01-31T16:28:17.944Z", "dateUpdated": "2024-08-01T23:28:12.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41116
Vulnerability from cvelistv5
Published
2021-10-05 17:40
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf | x_refsource_CONFIRM | |
https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa | x_refsource_MISC | |
https://www.sonarsource.com/blog/securing-developer-tools-package-managers/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.440Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf" }, { "name": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa" }, { "name": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003c 1.10.23" }, { "status": "affected", "version": "\u003e= 2.0, \u003c 2.1.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-24T23:04:26.576Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf" }, { "name": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa" }, { "name": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/", "tags": [ "x_refsource_MISC" ], "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/" } ], "source": { "advisory": "GHSA-frqg-7g38-6gcf", "discovery": "UNKNOWN" }, "title": "Command injection in composer on Windows" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41116", "datePublished": "2021-10-05T17:40:10", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-35242
Vulnerability from cvelistv5
Published
2024-06-10 21:23
Modified
2024-08-02 03:07
Severity ?
EPSS score ?
Summary
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "39" }, { "status": "affected", "version": "40" } ] }, { "cpes": [ "cpe:2.3:a:getcomposer:composer:2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "getcomposer", "versions": [ { "lessThan": "2.2.24", "status": "affected", "version": "2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:getcomposer:composer:2.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "getcomposer", "versions": [ { "lessThan": "2.7.7", "status": "affected", "version": "2.3", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-35242", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T20:44:05.596723Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T20:44:10.241Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:07:46.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-v9qv-c7wm-wgmf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-v9qv-c7wm-wgmf" }, { "name": "https://github.com/composer/composer/commit/6bd43dff859c597c09bd03a7e7d6443822d0a396", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/6bd43dff859c597c09bd03a7e7d6443822d0a396" }, { "name": "https://github.com/composer/composer/commit/fc57b93603d7d90b71ca8ec77b1c8a9171fdb467", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/composer/composer/commit/fc57b93603d7d90b71ca8ec77b1c8a9171fdb467" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "composer", "vendor": "composer", "versions": [ { "status": "affected", "version": "\u003e= 2.0, \u003c 2.2.24" }, { "status": "affected", "version": "\u003e= 2.3, \u003c 2.7.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T21:23:44.040Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/composer/composer/security/advisories/GHSA-v9qv-c7wm-wgmf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/composer/composer/security/advisories/GHSA-v9qv-c7wm-wgmf" }, { "name": "https://github.com/composer/composer/commit/6bd43dff859c597c09bd03a7e7d6443822d0a396", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/6bd43dff859c597c09bd03a7e7d6443822d0a396" }, { "name": "https://github.com/composer/composer/commit/fc57b93603d7d90b71ca8ec77b1c8a9171fdb467", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/composer/composer/commit/fc57b93603d7d90b71ca8ec77b1c8a9171fdb467" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/" } ], "source": { "advisory": "GHSA-v9qv-c7wm-wgmf", "discovery": "UNKNOWN" }, "title": "Composer vulnerable to command injection via malicious git/hg branch names" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-35242", "datePublished": "2024-06-10T21:23:44.040Z", "dateReserved": "2024-05-14T15:39:41.786Z", "dateUpdated": "2024-08-02T03:07:46.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }