Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-29472
HistoryApr 27, 2021 - 12:00 a.m.

CVE-2021-29472

2021-04-2700:00:00
ubuntu.com
ubuntu.com
19

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.117 Low

EPSS

Percentile

95.3%

Composer is a dependency manager for PHP. URLs for Mercurial repositories
in the root composer.json and package source download URLs are not
sanitized correctly. Specifically crafted URL values allow code to be
executed in the HgDriver if hg/Mercurial is installed on the system. The
impact to Composer users directly is limited as the composer.json file is
typically under their own control and source download URLs can only be
supplied by third party Composer repositories they explicitly trust to
download and execute source code from, e.g. Composer plugins. The main
impact is to services passing user input to Composer, including
Packagist.org and Private Packagist. This allowed users to trigger remote
code execution. The vulnerability has been patched on Packagist.org and
Private Packagist within 12h of receiving the initial vulnerability report
and based on a review of logs, to the best of our knowledge, was not abused
by anyone. Other services/tools using VcsRepository/VcsDriver or
derivatives may also be vulnerable and should upgrade their
composer/composer dependency immediately. Versions 1.10.22 and 2.0.13
include patches for this issue.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcomposer< 1.6.3-1ubuntu0.1~esm1UNKNOWN
ubuntu20.04noarchcomposer< 1.10.1-1ubuntu0.1~esm1UNKNOWN
ubuntu16.04noarchcomposer< 1.0.0~beta2-1ubuntu0.1~esm1UNKNOWN

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.117 Low

EPSS

Percentile

95.3%