`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.
References
Link | Resource |
---|---|
https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52 | Patch Third Party Advisory |
https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-11-23T00:00:00
Updated: 2022-11-23T00:00:00
Reserved: 2022-09-30T00:00:00
Link: CVE-2022-41922
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-23T18:15:12.630
Modified: 2022-11-30T13:44:59.773
Link: CVE-2022-41922
JSON object: View
Redhat Information
No data.
CWE