Lucene search

K
redosRedosROS-20240626-10
HistoryJun 26, 2024 - 12:00 a.m.

ROS-20240626-10

2024-06-2600:00:00
redos.red-soft.ru
1
php composer
vulnerability
dependency manager
arbitrary commands
remote attackers
input validation
unix

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.0%

A vulnerability in the getUnpushedChanges() function of the dependency manager for PHP Composer is related to the use of the status and reinstall commands.
status, reinstall and remove commands. Exploitation of the vulnerability could allow an attacker,
acting remotely, to execute arbitrary commands

A vulnerability in the Branch Name Handler component of the dependency manager for PHP Composer is associated with the use of the
using the composer install command running inside the git/hg repository. Exploitation of the vulnerability
could allow an attacker acting remotely to execute arbitrary commands.

A vulnerability in the composer.phar file of the dependency manager for PHP Composer is related to the operation of the
register_argc_argv in php.ini. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary commands

An implementation vulnerability in the VcsDriver::getFileContent() method of the dependency manager for PHP Composer is related to
with insufficient input validation when processing “$file” or “$identifier” arguments.
Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary
commands

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64composer<= 2.7.7-1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.0%