First published: Wed Apr 13 2022(Updated: )
Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/composer/composer | >=2.3<2.3.5>=2.0<2.2.12<1.10.26 | |
Getcomposer Composer | <1.10.26 | |
Getcomposer Composer | >=2.0.0<2.2.12 | |
Getcomposer Composer | >=2.3.0<2.3.5 | |
Tenable Tenable.sc | <5.21.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
composer/composer/composer | >=2.3<2.3.5 | 2.3.5 |
composer/composer/composer | >=2.0<2.2.12 | 2.2.12 |
composer/composer/composer | <1.10.26 | 1.10.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24828 is a vulnerability in the Composer dependency manager for PHP that allows command execution due to missing input validation.
CVE-2022-24828 affects Composer versions up to 2.3.5, 2.2.12, and 1.10.26.
The severity of CVE-2022-24828 is high with a CVSS score of 8.8.
To fix CVE-2022-24828, upgrade to Composer version 2.3.6, 2.2.13, or 1.10.27.
You can find more information about CVE-2022-24828 at the following references: [Link 1], [Link 2], [Link 3].