composer/composer is vulnerable to remote code execution. The vulnerability exists due to a lack of sanitization of the user-controlled $file or $identifier arguments via the VcsDriver::getFileContent()
allowing an attacker to inject maliciously crafted script into the system.
github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709
github.com/composer/composer/security/advisories/GHSA-x7cr-6qr6-2hh6
lists.fedoraproject.org/archives/list/[email protected]/message/625MT3IKWKFVIWLSYZFSXHVUA2LES7YQ/
lists.fedoraproject.org/archives/list/[email protected]/message/GWT6LDSRY7SFMTDZWJ4MS2ZBXHL7VQEF/
lists.fedoraproject.org/archives/list/[email protected]/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/
www.tenable.com/security/tns-2022-09