Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tdzJ3LTJoajItZmc4cc4AA3Kz

yiisoft/yii deserializing untrusted user input can lead to remote code execution

Impact

Affected versions of yiisoft/yii are vulnerable to Remote Code Execution (RCE) if the application calls unserialize() on arbitrary user input.

Patches

Upgrade yiisoft/yii to version 1.1.29 or higher.

For more information

See the following links for more details:

If you have any questions or comments about this advisory, contact us through security form.

Permalink: https://github.com/advisories/GHSA-mw2w-2hj2-fg8q
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tdzJ3LTJoajItZmc4cc4AA3Kz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-mw2w-2hj2-fg8q, CVE-2023-47130
References: Repository: https://github.com/yiisoft/yii
Blast Radius: 25.3

Affected Packages

packagist:yiisoft/yii
Dependent packages: 305
Dependent repositories: 1,325
Downloads: 4,654,449 total
Affected Version Ranges: < 1.1.29
Fixed in: 1.1.29
All affected versions: 1.1.14, 1.1.15, 1.1.16, 1.1.17, 1.1.18, 1.1.19, 1.1.20, 1.1.21, 1.1.22, 1.1.23, 1.1.24, 1.1.25, 1.1.26, 1.1.27, 1.1.28
All unaffected versions: 1.1.29, 1.1.30