Количество 3
Количество 3
CVE-2025-48493
The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.
GHSA-g3p6-82vc-43jh
Yii 2 Redis may expose AUTH parameters in logs in case of connection failure
BDU:2025-09066
Уязвимость расширения yiisoft/yii2-redis фреймворка Yii, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-48493 The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue. | CVSS3: 6.5 | 0% Низкий | 8 месяцев назад | |
GHSA-g3p6-82vc-43jh Yii 2 Redis may expose AUTH parameters in logs in case of connection failure | 0% Низкий | 8 месяцев назад | ||
BDU:2025-09066 Уязвимость расширения yiisoft/yii2-redis фреймворка Yii, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 6.6 | 0% Низкий | 8 месяцев назад |
Уязвимостей на страницу