CVE-2021-41116

NameCVE-2021-41116
DescriptionComposer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
composer (PTS)stretch (security)1.2.2-1+deb9u1fixed
stretch (lts), stretch1.2.2-1+deb9u3fixed
buster (security), buster, buster (lts)1.8.4-1+deb10u4fixed
bullseye (security), bullseye2.0.9-2+deb11u4fixed
bookworm (security), bookworm2.5.5-1+deb12u2fixed
sid, trixie2.8.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
composersource(unstable)(not affected)

Notes

- composer <not-affected> (Only affects Windows)
https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf
https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa

Search for package or bug name: Reporting problems