CVE-2015-8371 (GCVE-0-2015-8371)
Vulnerability from cvelistv5 – Published: 2023-09-21 00:00 – Updated: 2024-09-25 13:30
VLAI?
Summary
Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:13:32.879Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml"
},
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/composer/composer"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2015-8371",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-25T13:30:09.515383Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T13:30:18.745Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-21T05:07:00.321224",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html"
},
{
"url": "https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml"
},
{
"url": "https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml"
},
{
"url": "https://github.com/composer/composer"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-8371",
"datePublished": "2023-09-21T00:00:00",
"dateReserved": "2015-11-27T00:00:00",
"dateUpdated": "2024-09-25T13:30:18.745Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C65613-2D7C-4573-8381-FD2316C3C6AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha10:*:*:*:*:*:*\", \"matchCriteriaId\": \"15D442F0-7616-4555-A92A-91505ABAE2BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha11:*:*:*:*:*:*\", \"matchCriteriaId\": \"63D6B56B-0D1B-4D8D-BA86-785D5A6E172E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha2:*:*:*:*:*:*\", \"matchCriteriaId\": \"660F5019-7E0A-4C7F-A59F-BE7EE0D1FFB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E1F88EA-AF55-4AB6-98E7-808B039376EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha4:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B141B03-8830-4122-8458-85A777E9C6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C36AA813-596F-46D9-84CF-BD27CC3A7AEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha6:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC1FCFCC-F9F5-4BC9-9CFA-BEE75C58C947\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha7:*:*:*:*:*:*\", \"matchCriteriaId\": \"3630A39B-8591-4B9D-B9CB-63ADA45855B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C81CA33B-AF78-47C1-9B11-6698FB5C06B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:getcomposer:composer:1.0.0:alpha9:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D20E45B-8C04-4835-B672-03145F5A8DB0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.\"}, {\"lang\": \"es\", \"value\": \"Composer anterior al 10 de febrero de 2016 permite el envenenamiento de la cach\\u00e9 de otros proyectos creados en el mismo host. Esto da como resultado que el c\\u00f3digo controlado por el atacante ingrese a un proceso de compilaci\\u00f3n del lado del servidor. El problema se debe a la forma en que se almacenan en cach\\u00e9 los paquetes dist. La clave de cach\\u00e9 se deriva del nombre del paquete, el tipo de dist y algunos otros datos del repositorio de paquetes (que pueden ser simplemente un hash de confirmaci\\u00f3n y, por lo tanto, un atacante puede encontrarlos). Las versiones hasta 1.0.0-alpha11 se ven afectadas y la 1.0.0 no.\"}]",
"id": "CVE-2015-8371",
"lastModified": "2024-11-21T02:38:23.630",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2023-09-21T06:15:11.633",
"references": "[{\"url\": \"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/composer/composer\", \"source\": \"cve@mitre.org\", \"tags\": [\"Product\"]}, {\"url\": \"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/composer/composer\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\"]}, {\"url\": \"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-345\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-8371\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-09-21T06:15:11.633\",\"lastModified\":\"2024-11-21T02:38:23.630\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.\"},{\"lang\":\"es\",\"value\":\"Composer anterior al 10 de febrero de 2016 permite el envenenamiento de la cach\u00e9 de otros proyectos creados en el mismo host. Esto da como resultado que el c\u00f3digo controlado por el atacante ingrese a un proceso de compilaci\u00f3n del lado del servidor. El problema se debe a la forma en que se almacenan en cach\u00e9 los paquetes dist. La clave de cach\u00e9 se deriva del nombre del paquete, el tipo de dist y algunos otros datos del repositorio de paquetes (que pueden ser simplemente un hash de confirmaci\u00f3n y, por lo tanto, un atacante puede encontrarlos). Las versiones hasta 1.0.0-alpha11 se ven afectadas y la 1.0.0 no.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C65613-2D7C-4573-8381-FD2316C3C6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha10:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D442F0-7616-4555-A92A-91505ABAE2BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha11:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D6B56B-0D1B-4D8D-BA86-785D5A6E172E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"660F5019-7E0A-4C7F-A59F-BE7EE0D1FFB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E1F88EA-AF55-4AB6-98E7-808B039376EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B141B03-8830-4122-8458-85A777E9C6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36AA813-596F-46D9-84CF-BD27CC3A7AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC1FCFCC-F9F5-4BC9-9CFA-BEE75C58C947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3630A39B-8591-4B9D-B9CB-63ADA45855B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81CA33B-AF78-47C1-9B11-6698FB5C06B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:getcomposer:composer:1.0.0:alpha9:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D20E45B-8C04-4835-B672-03145F5A8DB0\"}]}]}],\"references\":[{\"url\":\"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/composer/composer\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/composer/composer\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/composer/composer\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T08:13:32.879Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2015-8371\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-25T13:30:09.515383Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-25T13:30:14.053Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://flyingmana.de/blog_en/2016/02/14/composer_cache_injection_vulnerability_cve_2015_8371.html\"}, {\"url\": \"https://github.com/FriendsOfPHP/security-advisories/blob/e26be423c5bcfdb38478d2f92d1f928c15afb561/composer/composer/CVE-2015-8371.yaml\"}, {\"url\": \"https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/composer/composer/CVE-2015-8371.yml\"}, {\"url\": \"https://github.com/composer/composer\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Composer before 2016-02-10 allows cache poisoning from other projects built on the same host. This results in attacker-controlled code entering a server-side build process. The issue occurs because of the way that dist packages are cached. The cache key is derived from the package name, the dist type, and certain other data from the package repository (which may simply be a commit hash, and thus can be found by an attacker). Versions through 1.0.0-alpha11 are affected, and 1.0.0 is unaffected.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-21T05:07:00.321224\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2015-8371\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-25T13:30:18.745Z\", \"dateReserved\": \"2015-11-27T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-09-21T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…