vulnerability
Ubuntu: USN-7603-1 (CVE-2024-35242): Composer vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Jun 10, 2024 | Jun 26, 2025 | Aug 18, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jun 10, 2024
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
Composer is a dependency manager for PHP. On the 2.x branch prior to versions 2.2.24 and 2.7.7, the `composer install` command running inside a git/hg repository which has specially crafted branch names can lead to command injection. This requires cloning untrusted repositories. Patches are available in version 2.2.24 for 2.2 LTS or 2.7.7 for mainline. As a workaround, avoid cloning potentially compromised repositories.
Solution
ubuntu-pro-upgrade-composer
References
- CVE-2024-35242
- https://attackerkb.com/topics/CVE-2024-35242
- CWE-77
- UBUNTU-USN-7603-1
- URL-https://github.com/composer/composer/commit/6bd43dff859c597c09bd03a7e7d6443822d0a396
- URL-https://github.com/composer/composer/commit/fc57b93603d7d90b71ca8ec77b1c8a9171fdb467
- URL-https://github.com/composer/composer/security/advisories/GHSA-v9qv-c7wm-wgmf
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/PO4MU2BC7VR6LMHEX4X7DKGHVFXZV2MC/
- URL-https://lists.fedoraproject.org/archives/list/[email protected]/message/VLPJHM2WWSYU2F6KHW2BYFGYL4IGTKHC/
- URL-https://www.cve.org/CVERecord?id=CVE-2024-35242
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.