Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 08:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 - Patch | |
| References | () https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q - Patch | |
| References | () https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection - Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.1 | 
20 Nov 2023, 20:30
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CPE | cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:* | |
| First Time | Yiiframework Yiiframework yii | |
| References | () https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection - Third Party Advisory | |
| References | () https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 - Patch | |
| References | () https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q - Patch | 
14 Nov 2023, 21:38
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-14 21:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47130
Mitre link : CVE-2023-47130
CVE.ORG link : CVE-2023-47130
JSON object : View
Products Affected
                yiiframework
- yii
CWE
                
                    
                        
                        CWE-502
                        
            Deserialization of Untrusted Data
