脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Missing input validation can lead to command execution in composer
脆弱性説明
Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$identifier` argument if you allow arbitrary data there (Packagist does not, but maybe other integrators do). Composer itself should not be affected by the vulnerability as it does not call `getFileContent` with arbitrary data into `$file`/`$identifier`. To the best of our knowledge this was not abused, and the vulnerability has been patched on packagist.org and Private Packagist within a day of the vulnerability report.
CVSS情報
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
脆弱性タイプ
输入验证不恰当
脆弱性タイトル
composer 参数注入漏洞
脆弱性説明
composer是一个应用软件。提供一个声明,管理和安装PHP项目的依赖项。 composer 存在参数注入漏洞,该漏洞源于缺少输入验证。攻击者可通过 VcsDriver::getFileContent() 执行命令。
CVSS情報
N/A
脆弱性タイプ
N/A