CVE-2023-47130 – yiisoft/yii
Package
Manager: composer
Name: yiisoft/yii
Vulnerable Version: >=0 <1.1.29
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03255 pctl0.8665
Details
yiisoft/yii deserializing untrusted user input can lead to remote code execution ### Impact Affected versions of `yiisoft/yii` are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. ### Patches Upgrade `yiisoft/yii` to version 1.1.29 or higher. ### For more information See the following links for more details: - [Git commit](https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06) - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
Metadata
Created: 2023-11-14T22:19:28Z
Modified: 2023-11-14T22:19:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-mw2w-2hj2-fg8q/GHSA-mw2w-2hj2-fg8q.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-mw2w-2hj2-fg8q
Finding: F096
Auto approve: 1