CVE-2022-41922 – yiisoft/yii
Package
Manager: composer
Name: yiisoft/yii
Vulnerable Version: >=0 <1.1.27
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03045 pctl0.86165
Details
Prevent RCE when deserializing untrusted user input ### Impact Affected versions of `yiisoft/yii` are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. ### Patches Upgrade `yiisoft/yii` to version 1.1.27 or higher. ### For more information See the following links for more details: - [Git commit](https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52) - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
Metadata
Created: 2022-11-21T22:32:04Z
Modified: 2022-11-21T22:32:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-442f-wcwq-fpcf/GHSA-442f-wcwq-fpcf.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-442f-wcwq-fpcf
Finding: F096
Auto approve: 1