Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-24821

Опубликовано: 09 фев. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.8

Описание

Composer is a dependency Manager for the PHP language. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. All Composer CLI commands are affected, including composer.phar's self-update. The following scenarios are of high risk: Composer being run with sudo, Pipelines which may execute Composer on untrusted projects, Shared environments with developers who run Composer individually on the same project. This vulnerability has been addressed in versions 2.7.0 and 2.2.23. It is advised that the patched versions are applied at the earliest convenience. Where not possible, the following should be addressed: Remove all sudo composer privileges for all users to mitiga...

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

needed

esm-apps/noble

needs-triage

esm-apps/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

needed

mantic

ignored

end of life, was needed

Показывать по

EPSS

Процентиль: 21%
0.00065
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

Composer is a dependency Manager for the PHP language. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. All Composer CLI commands are affected, including composer.phar's self-update. The following scenarios are of high risk: Composer being run with sudo, Pipelines which may execute Composer on untrusted projects, Shared environments with developers who run Composer individually on the same project. This vulnerability has been addressed in versions 2.7.0 and 2.2.23. It is advised that the patched versions are applied at the earliest convenience. Where not possible, the following should be addressed: Remove all sudo composer privileges for all users to mitigate

CVSS3: 8.8
debian
больше 1 года назад

Composer is a dependency Manager for the PHP language. In affected ver ...

suse-cvrf
больше 1 года назад

Security update for php-composer2

CVSS3: 8.8
github
больше 1 года назад

Composer code execution and possible privilege escalation via compromised InstalledVersions.php or installed.php

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость сценариев InstalledVersions.php и install.php менеджера зависимостей для PHP Composer, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии

EPSS

Процентиль: 21%
0.00065
Низкий

8.8 High

CVSS3

Уязвимость CVE-2024-24821