CVE-2020-15145

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15145
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15145.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15145
Related
  • GHSA-wgrx-r3qv-332c
Published
2020-08-14T17:15:14Z
Modified
2025-01-15T01:42:43.243928Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Composer-Setup for Windows before version 6.0.0, if the developer's computer is shared with other users, a local attacker may be able to exploit the following scenarios. 1. A local regular user may modify the existing C:\ProgramData\ComposerSetup\bin\composer.bat in order to get elevated command execution when composer is run by an administrator. 2. A local regular user may create a specially crafted dll in the C:\ProgramData\ComposerSetup\bin folder in order to get Local System privileges. See: https://itm4n.github.io/windows-server-netman-dll-hijacking. 3. If the directory of the php.exe selected by the user is not in the system path, it is added without checking that it is admin secured, as per Microsoft guidelines. See: https://msrc-blog.microsoft.com/2018/04/04/triaging-a-dll-planting-vulnerability.

References

Affected packages

Git / github.com/composer/windows-setup

Affected ranges

Type
GIT
Repo
https://github.com/composer/windows-setup
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v2.*

v2.1
v2.2
v2.3
v2.4
v2.5
v2.6
v2.7
v2.8

v3.*

v3.0

v4.*

v4.1.0
v4.10.0
v4.2.0
v4.3.0
v4.4.0
v4.5.0
v4.6.0
v4.7.0
v4.8.0
v4.9.0

v5.*

v5.0.0
v5.1.0