Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-442f-wcwq-fpcf: Prevent RCE when deserializing untrusted user input

Impact

Affected versions of yiisoft/yii are vulnerable to Remote Code Execution (RCE) if the application calls unserialize() on arbitrary user input.

Patches

Upgrade yiisoft/yii to version 1.1.27 or higher.

For more information

See the following links for more details:

  • Git commit
  • https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection

If you have any questions or comments about this advisory, contact us through security form.

ghsa
#vulnerability#git#php#rce

Prevent RCE when deserializing untrusted user input

High severity GitHub Reviewed Published Nov 21, 2022 in yiisoft/yii • Updated Nov 21, 2022

Package

composer yiisoft/yii (Composer)

Affected versions

< 1.1.27

Patched versions

1.1.27

Description

Impact

Affected versions of yiisoft/yii are vulnerable to Remote Code Execution (RCE) if the application calls unserialize() on arbitrary user input.

Patches

Upgrade yiisoft/yii to version 1.1.27 or higher.

For more information

See the following links for more details:

  • Git commit
  • https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection

If you have any questions or comments about this advisory, contact us through security form.

References

  • GHSA-442f-wcwq-fpcf

samdark published the maintainer security advisory

Nov 21, 2022

Severity

High

8.1

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

High

Privileges required

None

User interaction

None

Scope

Unchanged

Confidentiality

High

Integrity

High

Availability

High

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

No CWEs

CVE ID

CVE-2022-41922

GHSA ID

GHSA-442f-wcwq-fpcf

Source code

yiisoft/yii

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2022-41922: Prevent RCE when deserializing untrusted user input

`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.