Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tdzJ3LTJoajItZmc4cc4AA3Kz
yiisoft/yii deserializing untrusted user input can lead to remote code execution
Impact
Affected versions of yiisoft/yii
are vulnerable to Remote Code Execution (RCE) if the application calls unserialize()
on arbitrary user input.
Patches
Upgrade yiisoft/yii
to version 1.1.29 or higher.
For more information
See the following links for more details:
If you have any questions or comments about this advisory, contact us through security form.
Permalink: https://github.com/advisories/GHSA-mw2w-2hj2-fg8qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tdzJ3LTJoajItZmc4cc4AA3Kz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-mw2w-2hj2-fg8q, CVE-2023-47130
References:
- https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q
- https://nvd.nist.gov/vuln/detail/CVE-2023-47130
- https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06
- https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
- https://github.com/advisories/GHSA-mw2w-2hj2-fg8q
Blast Radius: 25.3
Affected Packages
packagist:yiisoft/yii
Dependent packages: 305Dependent repositories: 1,325
Downloads: 4,654,449 total
Affected Version Ranges: < 1.1.29
Fixed in: 1.1.29
All affected versions: 1.1.14, 1.1.15, 1.1.16, 1.1.17, 1.1.18, 1.1.19, 1.1.20, 1.1.21, 1.1.22, 1.1.23, 1.1.24, 1.1.25, 1.1.26, 1.1.27, 1.1.28
All unaffected versions: 1.1.29, 1.1.30