cve/2021/CVE-2021-41116.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-41116](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41116)
![](https://img.shields.io/static/v1?label=Product&message=composer&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=%3C%201.10.23%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.0%2C%20%3C%202.1.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.
### POC
#### Reference
- https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
#### Github
No PoCs found on GitHub currently.