PT-2023-9221 · Composer +6 · Composer +6
Thomas-Chauchefoin-Sonarsource
·
Published
2023-09-29
·
Updated
2025-06-30
·
CVE-2023-43655
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Composer versions prior to 1.10.27
Composer versions prior to 2.2.22
Composer versions prior to 2.6.4
Description:
The issue is related to the Composer dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register argc argv` enabled in php.ini.
Recommendations:
For versions prior to 1.10.27, upgrade to version 1.10.27 or later.
For versions prior to 2.2.22, upgrade to version 2.2.22 or later.
For versions prior to 2.6.4, upgrade to version 2.6.4 or later.
As a temporary workaround, consider disabling the `register argc argv` setting in php.ini to minimize the risk of exploitation.
Avoid publishing composer.phar to the web as this is not best practice.
Fix
RCE
Special Elements Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 64
- https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf⭐ 29024 🔗 4656 · Vendor Advisory
- https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d⭐ 29024 🔗 4656 · Patch
- https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c⭐ 29024 🔗 4656 · Patch
- https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c⭐ 29024 🔗 4656 · Patch
- https://wiki.astralinux.ru/pages/viewpage.action?pageId=319139257 · Vendor Advisory
- https://bdu.fstec.ru/vul/2024-01128 · Security Note
- https://ubuntu.com/security/CVE-2024-35241 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/708772 · Security Note
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-24821 · Vendor Advisory
- https://bdu.fstec.ru/vul/2022-02944 · Security Note
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-43655 · Vendor Advisory
- https://ubuntu.com/security/CVE-2022-24828 · Vendor Advisory