The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade composer/composer
to version 2.2.23, 2.7.0 or higher.
composer/composer is a Dependency Manager for PHP. Composer helps you declare, manage and install dependencies of PHP projects. It ensures you have the right stack everywhere.
Affected versions of this package are vulnerable to Inclusion of Functionality from Untrusted Control Sphere due to the inclusion of several files within the local working directory during the invocation of the package and in the context of the executing user. Under certain conditions, an attacker can escalate privileges locally, move laterally between users, or execute malicious code when the package is invoked within a directory containing tampered files.
Note:
The risk is increased if the package is run with sudo, in pipelines executing on untrusted projects, or in shared environments where developers run the package individually on the same project.
This vulnerability can be mitigated by removing all sudo privileges for all users to prevent root privilege escalation, avoiding running the package within an untrusted directory, or, if necessary, verifying that the contents of vendor/composer/InstalledVersions.php
and vendor/composer/installed.php
do not include untrusted code. A reset on these files can also be performed by executing:
rm vendor/composer/installed.php vendor/composer/InstalledVersions.php
composer install --no-scripts --no-plugins