Описание
yii2-redis Potential Remote code execution
Potential remote code execution in LUA context of the redis server via methods yii\redis\ActiveRecord::findOne() and yii\redis\ActiveRecord::findAll() in yiisoft/yii2-redis. Attackers could probably manipulate data on the redis server.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-8073
- https://github.com/FriendsOfPHP/security-advisories/blob/master/yiisoft/yii2-redis/CVE-2018-8073.yaml
- https://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes
- http://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes
Пакеты
Наименование
yiisoft/yii2-redis
composer
Затронутые версииВерсия исправления
< 2.0.8
2.0.8
Связанные уязвимости
CVSS3: 9.8
nvd
почти 8 лет назад
Yii 2.x before 2.0.15 allows remote attackers to execute arbitrary LUA code via a variant of the CVE-2018-7269 attack in conjunction with the Redis extension.
CVSS3: 9.8
debian
почти 8 лет назад
Yii 2.x before 2.0.15 allows remote attackers to execute arbitrary LUA ...