First published: Wed Feb 10 2016(Updated: )
Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/composer/composer | <=1.0.0-alpha11 | |
composer/composer/composer | <=1.0.0-alpha11 | 1.0.0 |
Composer | =1.0.0-alpha1 | |
Composer | =1.0.0-alpha10 | |
Composer | =1.0.0-alpha11 | |
Composer | =1.0.0-alpha2 | |
Composer | =1.0.0-alpha3 | |
Composer | =1.0.0-alpha4 | |
Composer | =1.0.0-alpha5 | |
Composer | =1.0.0-alpha6 | |
Composer | =1.0.0-alpha7 | |
Composer | =1.0.0-alpha8 | |
Composer | =1.0.0-alpha9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8371 has a high severity due to the potential for remote code execution via cache poisoning.
To fix CVE-2015-8371, update Composer to version 1.0.0 or later.
Affected versions of Composer include all versions before 1.0.0, specifically up to 1.0.0-alpha11.
CVE-2015-8371 is a cache injection vulnerability that can be exploited to execute attacker-controlled code.
CVE-2015-8371 allows attackers to inject malicious code, which can compromise the integrity of server-side processes.