'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-12-02 | |
| Rule Name: | Yii PHP Deserialization Vulnerability (CVE-2020-15148) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory. | |
| Impact: | An attacker can carefully construct malicious serialized data and pass it to the application, and execute the malicious code constructed by the attacker when the application deserializes the object. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99 https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj |
|
| Solutions |
|---|
| Please refer to announcements or patches release by the vendor: https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj |