8.8

CVE-2015-8371

Exploit

Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.

Data is provided by the National Vulnerability Database (NVD)
GetcomposerComposer Version1.0.0 Updatealpha1
GetcomposerComposer Version1.0.0 Updatealpha10
GetcomposerComposer Version1.0.0 Updatealpha11
GetcomposerComposer Version1.0.0 Updatealpha2
GetcomposerComposer Version1.0.0 Updatealpha3
GetcomposerComposer Version1.0.0 Updatealpha4
GetcomposerComposer Version1.0.0 Updatealpha5
GetcomposerComposer Version1.0.0 Updatealpha6
GetcomposerComposer Version1.0.0 Updatealpha7
GetcomposerComposer Version1.0.0 Updatealpha8
GetcomposerComposer Version1.0.0 Updatealpha9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.72% 0.716
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-345 Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.