Vulnerability Description
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using `--prefer-dist` or the `preferred-install: dist` config setting.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b
- https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f6
- https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b
- https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f6
- https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://www.vicarius.io/vsociety/posts/cve-2024-35241-detect-composer-vulnerabil
- https://www.vicarius.io/vsociety/posts/cve-2024-35241-mitigate-vulnerable-compos
FAQ
What is CVE-2024-35241?
CVE-2024-35241 is a vulnerability with a CVSS score of 8.8 (HIGH). Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing s...
How severe is CVE-2024-35241?
CVE-2024-35241 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-35241?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.