CVE-2022-24828

Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
Argument Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.3 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
GitHub_MCNA
8.3 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
getcomposercomposer
𝑥
< 1.10.26
getcomposercomposer
2.0.0 ≤
𝑥
< 2.2.12
getcomposercomposer
2.3.0 ≤
𝑥
< 2.3.5
tenabletenable.sc
𝑥
< 5.21.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
composer
bullseye (security)
2.0.9-2+deb11u4
fixed
bullseye
2.0.9-2+deb11u4
fixed
stretch
no-dsa
bookworm
2.5.5-1+deb12u2
fixed
bookworm (security)
2.5.5-1+deb12u2
fixed
sid
2.8.2-1
fixed
trixie
2.8.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
composer
noble
needed
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needed
impish
ignored
focal
needed
bionic
needed
xenial
needed
trusty
dne