vulnerability
Ubuntu: USN-7603-1 (CVE-2024-35241): Composer vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jun 10, 2024 | Jun 26, 2025 | Aug 18, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jun 10, 2024
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `status`, `reinstall` and `remove` commands with packages installed from source via git containing specially crafted branch names in the repository can be used to execute code. Patches for this issue are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid installing dependencies via git by using `--prefer-dist` or the `preferred-install: dist` config setting.
Solution
ubuntu-pro-upgrade-composer
References
- CVE-2024-35241
- https://attackerkb.com/topics/CVE-2024-35241
- CWE-77
- UBUNTU-USN-7603-1
- URL-https://github.com/composer/composer/commit/b93fc6ca437da35ae73d667d0618749c763b67d4
- URL-https://github.com/composer/composer/commit/ee28354ca8d33c15949ad7de2ce6656ba3f68704
- URL-https://github.com/composer/composer/security/advisories/GHSA-47f6-5gq3-vx9c
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/
- URL-https://www.cve.org/CVERecord?id=CVE-2024-35241
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.