Lucene search

K
githubGitHub Advisory DatabaseGHSA-JM6M-4632-36HF
HistorySep 29, 2023 - 8:39 p.m.

Composer Remote Code Execution vulnerability via web-accessible composer.phar

2023-09-2920:39:21
CWE-74
GitHub Advisory Database
github.com
62
vulnerability
web-accessible
php
register_argc_argv
patch
workarounds
server
publishing

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.0%

Impact

Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be impacted if PHP also has register_argc_argv enabled in php.ini.

Patches

2.6.4, 2.2.22 and 1.10.27 patch this vulnerability.

Workarounds

Make sure register_argc_argv is disabled in php.ini, and avoid publishing composer.phar to the web as this really should not happen.

Affected configurations

Vulners
Node
composercomposerRange<2.6.4
OR
composercomposerRange<2.2.22
OR
composercomposerRange<1.10.27

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.0%