• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers report supply chain vulnerability in packagist php repository

Researchers Report Supply Chain Vulnerability in Packagist PHP Repository

You are here: Home / General Cyber Security News / Researchers Report Supply Chain Vulnerability in Packagist PHP Repository
October 4, 2022

Scientists have disclosed details about a now-patched higher-severity security flaw in Packagist, a PHP program bundle repository, that could have been exploited to mount software package provide chain attacks.

“This vulnerability makes it possible for getting management of Packagist,” SonarSource researcher Thomas Chauchefoin stated in a report shared with The Hacker Information. Packagist is applied by the PHP offer manager Composer to ascertain and down load software dependencies that are involved by developers in their jobs.

The disclosure will come as planting malware in open up source repositories is turning into an interesting conduit for mounting software package provide chain attacks.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

Tracked as CVE-2022-24828 (CVSS score: 8.8), the issue has been described as a scenario of command injection and is linked to yet another comparable Composer bug (CVE-2021-29472) that arrived to mild in April 2021, suggesting an insufficient patch.

“An attacker managing a Git or Mercurial repository explicitly mentioned by URL in a project’s composer.json can use specifically crafted department names to execute instructions on the machine operating composer update,” Packagist disclosed in an April 2022 advisory.

A profitable exploitation of the flaw intended that requests to update a package could have been hijacked to distribute malicious dependencies by executing arbitrary commands on the backend server operating the official instance of Packagist.

“Compromising [the backend services] would permit attackers to drive customers to download backdoored program dependencies the subsequent time they do a contemporary set up or an update of a Composer package,” Chauchefoin discussed.

CyberSecurity

That reported, there is no proof the vulnerability has been exploited to day. Fixes have been deployed in Composer versions 1.10.26, 2.2.12, and 2.3.5 immediately after SonarSource noted the flaw on April 7, 2022.

Open up resource code has increasingly come to be a beneficial target of option for menace actors owing to the ease with which they can be weaponized from the application supply chain.

Before this April, SonarSource also detailed a 15-12 months-old security flaw in the PEAR PHP repository that could permit an attacker to receive unauthorized access and publish rogue offers and execute arbitrary code.

“Whilst offer chains can acquire different types, one particular of them is appreciably much more impactful: By getting entry to the servers distributing these third-party software package factors, menace actors can change them to get a foothold in the techniques of their customers,” Chauchefoin said.

Discovered this posting appealing? Observe THN on Fb, Twitter  and LinkedIn to browse extra unique material we submit.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Malicious Tor Browser Installers Spread Via Darknet Video on YouTube
Next Post: Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer popular youtube channel caught distributing malicious tor browser installer»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.