logo

CVE-2020-15148 yiisoft/yii2

Package

Manager: composer
Name: yiisoft/yii2
Vulnerable Version: >=0 <2.0.38

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.917 pctl0.9967

Details

Unsafe deserialization in Yii 2 ### Impact Remote code execution in case application calls `unserialize()` on user input containing specially crafted string. ### Patches 2.0.38 ### Workarounds Add the following to BatchQueryResult.php: ```php public function __sleep() { throw new \BadMethodCallException('Cannot serialize '.__CLASS__); } public function __wakeup() { throw new \BadMethodCallException('Cannot unserialize '.__CLASS__); } ``` ### For more information If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).

Metadata

Created: 2020-09-15T18:19:56Z
Modified: 2021-01-07T22:56:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-699q-wcff-g9mj/GHSA-699q-wcff-g9mj.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-699q-wcff-g9mj
Finding: F096
Auto approve: 1