Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory.
References
Link | Resource |
---|---|
https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99 | Patch Third Party Advisory |
https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj | Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-09-15T18:25:12
Updated: 2020-09-15T18:25:12
Reserved: 2020-06-25T00:00:00
Link: CVE-2020-15148
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-15T19:15:12.963
Modified: 2020-09-22T15:39:59.987
Link: CVE-2020-15148
JSON object: View
Redhat Information
No data.
CWE