All Composer CLI commands are affected, including composer.phar's self-update. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. Users should prioritize migrating to other packages that offer similar functionality with enhanced security.Ĭomposer is a dependency Manager for the PHP language. Given the decision to deprecate the pkg package, there are no official workarounds or remediations provided by our team. We would recommend investigating Node.js 21’s support for single executable applications. Users should transition to actively maintained alternatives. To check if your executable build by pkg depends on native code and is vulnerable, run the executable and check if `/tmp/pkg/` was created. Therefore, there will not be a patch provided for this vulnerability. A user may then run the malicious executable without realising it has been modified. An attacker who has access to the same local system has the ability to replace the genuine executables in the shared directory with malicious executables of the same name. There is no uniqueness to the package names within this directory, they are predictable. On unix systems, this is `/tmp/pkg/*` which is a shared directory for all users on the same local system. Any native code packages built by `pkg` are written to a hardcoded directory. Pkg is tool design to bundle Node.js projects into an executables. There are no known workarounds for this vulnerability. This issue has been addressed in versions 7.1.33 and 8.0.7. Specially crafted GET request parameters handled by any of the following endpoints of sidekiq-unique-jobs' "admin" web UI, allow a super-user attacker, or an unwitting, but authorized, victim, who has received a disguised / crafted link, to successfully execute malicious code, which could potentially steal cookies, session data, or local storage data from the app the sidekiq-unique-jobs web UI is mounted in. Sidekiq-unique-jobs is an open source project which prevents simultaneous Sidekiq jobs with the same unique arguments to run.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |