The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade composer/composer to version 2.2.27, 2.9.6 or higher.
composer/composer is a Dependency Manager for PHP. Composer helps you declare, manage and install dependencies of PHP projects. It ensures you have the right stack everywhere.
Affected versions of this package are vulnerable to Command Injection via the Perforce::syncCodeBase and Perforce::generateP4Command methods, which append user-controlled input from package metadata directly to shell commands without proper escaping. An attacker can execute arbitrary system commands by supplying crafted source references or URLs containing shell metacharacters in a malicious Composer repository. This is only exploitable if dependencies are installed or updated from source (such as with the --prefer-source flag or when installing dev-prefixed versions).
This vulnerability can be mitigated by avoiding installation of dependencies from source by using the --prefer-dist flag or setting preferred-install: dist in configuration, and by only using trusted Composer repositories.