Vulnerability DatabaseGHSA-g3j5-mpp2-2fqm

GHSA-g3j5-mpp2-2fqm
PHP vulnerability analysis and mitigation

Overview

A malicious typosquatting package named 'symfont/process' was discovered in September 2021, targeting users of the legitimate 'symfony/process' package. The malware was identified in the Composer package repository Packagist and was designed to exploit developers who might accidentally misspell the package name during installation (Kernelmode Blog, GitHub Advisory).

Technical details

The malicious package was designed to be automatically loaded upon installation. When executed through a call to 'new Symfony\Process\Process()', the malware would communicate with a command and control server at hxxp://www.yls333[.]com/dev.php, transmitting the contents of the $_SERVER superglobal variable, which includes sensitive server information such as IP, port, and hostname (Kernelmode Blog).

Impact

When successfully installed, the malware could expose sensitive server information to attackers and potentially allow remote code execution through a web shell. The malware would activate whenever a Process instance was created in the application, potentially affecting all visitors to the compromised website (Kernelmode Blog).

Mitigation and workarounds

The malicious package was removed from Packagist.org on September 10th, 2021. To prevent similar attacks, developers should carefully verify package names during installation and implement proper package verification procedures (Kernelmode Blog).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-898v-775g-777cCRITICAL9.4
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-5j8p-438x-rgg5CRITICAL9.3
  • PHPPHP
  • onelogin/php-saml
NoYesDec 09, 2025
GHSA-j8g6-5gqc-mq36HIGH8.2
  • PHPPHP
  • neuron-core/neuron-ai
NoYesDec 09, 2025
GHSA-pvcv-q3q7-266gHIGH8.1
  • PHPPHP
  • filament/filament
NoYesDec 09, 2025
GHSA-6w82-v552-wjw2HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management