CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
65.3%
Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call VcsDriver::getFileContent
can have a code injection vulnerability if the user can control the $file
or $identifier
argument. This leads to a vulnerability on packagist.org for example where the composer.json’s readme
field can be used as a vector for injecting parameters into hg/Mercurial via the $file
argument, or git via the $identifier
argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call getFileContent
with arbitrary data into $file
/$identifier
. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | composer | < 2.2.12-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
Alpine | 3.17-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
Alpine | 3.20-community | noarch | composer | < 2.3.5-r0 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
65.3%