CVE-2023-43655

Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.
References
Link Resource
https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d Patch
https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c Patch
https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c Patch
https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/ Mailing List Third Party Advisory
https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d Patch
https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c Patch
https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c Patch
https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AWYAUZNH565NWPIKGEIYBWHYNM5JGAE/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFOPGPW2KS37O3KJWBRGTUWHTXCQXBS2/ Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*
cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*
cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

23 Apr 2025, 17:31

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
References () https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html - () https://lists.debian.org/debian-lts-announce/2024/03/msg00030.html - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66H2WKFUO255T3BZTL72TNYJYH2XM5FG/ - Mailing List, Third Party Advisory

13 Feb 2025, 17:17

Type Values Removed Values Added
Summary (en) Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice. (en) Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has `register_argc_argv` enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure `register_argc_argv` is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.

Information

Published : 2023-09-29 20:15

Updated : 2025-04-23 17:31


NVD link : CVE-2023-43655

Mitre link : CVE-2023-43655

CVE.ORG link : CVE-2023-43655


JSON object : View

Products Affected

getcomposer

  • composer

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')