TROYANOSYVIRUS
Back to CVEs

CVE-2022-24828

HIGH
8.3

Description

Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.

CVE Details

CVSS v3.1 Score8.3
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionREQUIRED
Published4/13/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

fedoraproject:fedoragetcomposer:composertenable:tenable.sc

Weaknesses (CWE)

CWE-20CWE-88

References

https://www.tenable.com/security/tns-2022-09(security-advisories@github.com)
https://www.tenable.com/security/tns-2022-09(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.