taoteh1221 / Open_Crypto_Tracker

Bitcoin / Alts private portfolio tracker, with email / text / alexa / telegram price alerts, charts, leverage support and much more.
https://taoteh1221.github.io
GNU General Public License v3.0
92 stars 22 forks source link

CVE-2021-41116 (High) detected in composer/composer-1.10.22 - autoclosed #35

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2021-41116 - High Severity Vulnerability

Vulnerable Library - composer/composer-1.10.22

Composer helps you declare, manage and install dependencies of PHP projects. It ensures you have the right stack everywhere.

Library home page: https://api.github.com/repos/composer/composer/zipball/28c9dfbe2351635961f670773e8d7b17bc5eda25

Dependency Hierarchy: - dealerdirect/phpcodesniffer-composer-installer-v0.7.1 (Root Library) - :x: **composer/composer-1.10.22** (Vulnerable Library)

Found in HEAD commit: 646ba713891c3a8748f730afadfd39f8cf1b635d

Found in base branch: main

Vulnerability Details

Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.

Publish Date: 2021-10-05

URL: CVE-2021-41116

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-frqg-7g38-6gcf

Release Date: 2021-10-05

Fix Resolution: 1.10.23, 2.1.9


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.