First published: Fri Sep 29 2023(Updated: )
### Impact Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be impacted if PHP also has `register_argc_argv` enabled in php.ini. ### Patches 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. ### Workarounds Make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this really should not happen.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Getcomposer Composer | <1.10.27 | |
Getcomposer Composer | >=2.0.0<2.2.21 | |
Getcomposer Composer | >=2.3.0<2.6.4 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a PHP file may be impacted if PHP also has register_argc_argv enabled in php.ini.
You can patch this vulnerability by updating Composer to version 2.6.4, 2.2.22, or 1.10.27.
To mitigate this vulnerability, ensure that register_argc_argv is disabled in php.ini or restrict access to the composer.phar file.
The severity of this vulnerability is medium with a CVSS score of 6.4.
You can find more information about CVE-2023-43655 in the following references: - [GitHub Security Advisory](https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf) - [GitHub Commit 1](https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d) - [GitHub Commit 2](https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c)