Количество 3
Количество 3

CVE-2025-48493
The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
GHSA-g3p6-82vc-43jh
Yii 2 Redis may expose AUTH parameters in logs in case of connection failure

BDU:2025-09066
Уязвимость расширения yiisoft/yii2-redis фреймворка Yii, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-48493 The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue. | 0% Низкий | 3 месяца назад | |
GHSA-g3p6-82vc-43jh Yii 2 Redis may expose AUTH parameters in logs in case of connection failure | 0% Низкий | 3 месяца назад | ||
![]() | BDU:2025-09066 Уязвимость расширения yiisoft/yii2-redis фреймворка Yii, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 6.6 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу