cve/2023/CVE-2023-47130.md

18 lines
953 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-47130](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47130)
![](https://img.shields.io/static/v1?label=Product&message=yii&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.1.29%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
#### Github
No PoCs found on GitHub currently.