Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:47485
HistoryJun 12, 2024 - 6:25 a.m.

Code Execution

2024-06-1206:25:27
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
2
composer vulnerability
code execution
improper branch name
status command
reinstall command
remove command
git
arbitrary code

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

composer/composer is vulnerable to Code Execution. The vulnerability is due to improper branch name sanitization within the status, reinstall, and remove commands when handling packages installed from source via git, which allows an attacker to execute arbitrary code.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%