CVE-2022-41922
Published on: Not Yet Published
Last Modified on: 11/30/2022 01:44:00 PM UTC
Certain versions of Yii from Yiiframework contain the following vulnerability:
`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.
- CVE-2022-41922 has been assigned by
security-adviso[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
yiisoft - yii version < 1.1.27
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Merge pull request from GHSA-442f-wcwq-fpcf · yiisoft/yii@ed67b7c · GitHub | github.com text/html |
![]() |
Prevent RCE when deserializing untrusted user input · Advisory · yiisoft/yii · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Yiiframework | Yii | All | All | All | All |
- cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-41922 : `yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution RCE if the applicati… twitter.com/i/web/status/1… | 2022-11-23 18:06:40 |
![]() |
Potentially Critical CVE Detected! CVE-2022-41922 `yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code… twitter.com/i/web/status/1… | 2022-11-23 18:56:01 |
![]() |
CVE-2022-41922 | 2022-11-23 18:38:37 |