Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 - Patch | |
References | () https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q - Patch | |
References | () https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
20 Nov 2023, 20:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Yiiframework yii
Yiiframework |
|
CPE | cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection - Third Party Advisory | |
References | () https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 - Patch | |
References | () https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q - Patch |
14 Nov 2023, 21:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 21:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47130
Mitre link : CVE-2023-47130
CVE.ORG link : CVE-2023-47130
JSON object : View
Products Affected
yiiframework
- yii
CWE
CWE-502
Deserialization of Untrusted Data