6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.117 Low
EPSS
Percentile
95.3%
Composer is a dependency manager for PHP. URLs for Mercurial repositories
in the root composer.json and package source download URLs are not
sanitized correctly. Specifically crafted URL values allow code to be
executed in the HgDriver if hg/Mercurial is installed on the system. The
impact to Composer users directly is limited as the composer.json file is
typically under their own control and source download URLs can only be
supplied by third party Composer repositories they explicitly trust to
download and execute source code from, e.g. Composer plugins. The main
impact is to services passing user input to Composer, including
Packagist.org and Private Packagist. This allowed users to trigger remote
code execution. The vulnerability has been patched on Packagist.org and
Private Packagist within 12h of receiving the initial vulnerability report
and based on a review of logs, to the best of our knowledge, was not abused
by anyone. Other services/tools using VcsRepository/VcsDriver or
derivatives may also be vulnerable and should upgrade their
composer/composer dependency immediately. Versions 1.10.22 and 2.0.13
include patches for this issue.
getcomposer.org/
github.com/composer/composer/commit/083b73515d1d72bc61c6374440b3f8a37531f8cf
github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx
launchpad.net/bugs/cve/CVE-2021-29472
nvd.nist.gov/vuln/detail/CVE-2021-29472
security-tracker.debian.org/tracker/CVE-2021-29472
ubuntu.com/security/notices/USN-5220-1
www.cve.org/CVERecord?id=CVE-2021-29472
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.117 Low
EPSS
Percentile
95.3%