Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-35241
HistoryJun 10, 2024 - 9:19 p.m.

CVE-2024-35241 Composer vulnerable to command injection via malicious git branch name

2024-06-1021:19:47
CWE-77
GitHub_M
github.com
8
composer
php
command injection
git
cve-2024-35241
dependency manager
2.2.24
2.7.7

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the status, reinstall and remove commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using --prefer-dist or the preferred-install: dist config setting.

CNA Affected

[
  {
    "vendor": "composer",
    "product": "composer",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.0, < 2.2.24"
      },
      {
        "status": "affected",
        "version": ">= 2.3, < 2.7.7"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
      "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
    ],
    "vendor": "fedoraproject",
    "product": "fedora",
    "versions": [
      {
        "status": "affected",
        "version": "39"
      },
      {
        "status": "affected",
        "version": "40"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:getcomposer:composer:2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "getcomposer",
    "product": "composer",
    "versions": [
      {
        "status": "affected",
        "version": "2.0",
        "lessThan": "2.2.24",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:getcomposer:composer:2.3:*:*:*:*:*:*:*"
    ],
    "vendor": "getcomposer",
    "product": "composer",
    "versions": [
      {
        "status": "affected",
        "version": "2.3",
        "lessThan": "2.7.7",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total