Audit your Composer dependencies for security vulnerabilities, uses data from FriendsOfPHP/security-advisories. Compatible with Composer 1 and 2.
This Composer plugin allows you to audit your dependencies for security vulnerabilities without sending your lock file to an external service or using closed source software.
Note this command is distinct from the audit
command built into Composer ≥ 2.4.
This plugin can either be installed as a dependency in your project or “globally” so that it is always available on your machine.
composer require --dev cs278/composer-audit ^1
composer global require cs278/composer-audit ^1
This will audit all locked dependencies from composer.lock
.
If your package does not have a composer.lock
file (e.g. because it’s a
library) the installed packages, located in vendor/composer/installed.json
will be validated instead.
composer security-audit
Only audit your production dependencies from composer.lock
, this option only
works when there is a composer.lock
file.
composer security-audit --no-dev
You can force an update of the security advisories database using the --update
option, without this option being supplied the database will be downloaded if it
does not exist or it’s more than an hour old. For example:
composer security-audit --update
Composer Audit can be configured using the extra
property
in your composer.json
file, all configuration should be supplied under the
composer-audit
key.
{
...
"extra": {
...
"composer-audit": {
"option1": "super"
},
...
},
...
}
Currently only filtering advisories by CVE is possible, further options are planned.
You are able to ignore warnings about an advisory by filtering based on its CVE reference, this is useful if you decide the risk is acceptable or not applicable and you cannot otherwise upgrade the package to resolve the problem.
{
...
"extra": {
...
"composer-audit": {
"ignore": [
{"type": "cve", "value": "CVE-2000-1234567"},
{"type": "cve", "value": "CVE-2000-7654321"}
]
},
...
},
...
}
# Require a vulnerable package
composer require symfony/http-foundation 2.0.4
# Require Composer Audit
composer require --dev cs278/composer-audit ^1
composer security-audit
Found 9 advisories affecting 1 package(s).
composer://symfony/http-foundation (2.0.4)
* Request::getClientIp() when the trust proxy mode is enabled
* CVE-2012-6431: Routes behind a firewall are accessible even when not logged in
* CVE-2013-4752: Request::getHost() poisoning
* CVE-2014-5244: Denial of service with a malicious HTTP Host header
* CVE-2014-6061: Security issue when parsing the Authorization header
* CVE-2015-2309: Unsafe methods in the Request class
* CVE-2018-11386: Denial of service when using PDOSessionHandler
* CVE-2018-14773: Remove support for legacy and risky HTTP headers
* CVE-2019-18888: Prevent argument injection in a MimeTypeGuesser
Hyperlinks will be rendered to the appropriate CVE and advisory where available.