DEBIAN-CVE-2023-43655

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-43655
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-43655.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-43655
Upstream
Published
2023-09-29T20:15:09Z
Modified
2025-09-19T06:23:31Z
Summary
[none]
Details

Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has register_argc_argv enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure register_argc_argv is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.

References

Affected packages

Debian:13 / composer

Package

Name
composer
Purl
pkg:deb/debian/composer?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / composer

Package

Name
composer
Purl
pkg:deb/debian/composer?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}