Описание
Unsafe deserialization in Yii 2
Impact
Remote code execution in case application calls unserialize() on user input containing specially crafted string.
Patches
2.0.38
Workarounds
Add the following to BatchQueryResult.php:
For more information
If you have any questions or comments about this advisory, contact us through security form.
Ссылки
- https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj
- https://nvd.nist.gov/vuln/detail/CVE-2020-15148
- https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99
- https://github.com/FriendsOfPHP/security-advisories/blob/master/yiisoft/yii2/CVE-2020-15148.yaml
- https://www.yiiframework.com/news/303/yii-2-0-38
Пакеты
yiisoft/yii2
< 2.0.38
2.0.38
Связанные уязвимости
Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory.
Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote cod ...
Уязвимость PHP фреймворка Yii, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю выполнить произвольный код