First published: Tue Mar 20 2018(Updated: )
Possibility of manipulated condition when unfiltered input is passed to `yii\elasticsearch\ActiveRecord::findOne()` and `::findAll()`
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/yiisoft/yii2-elasticsearch | <2.0.5 | |
composer/yiisoft/yii2-dev | >=2.0.0<2.0.15 | 2.0.15 |
Yiiframework Yii | >=2.0.0<2.0.15 | |
composer/yiisoft/yii2-elasticsearch | <2.0.5 | 2.0.5 |
>=2.0.0<2.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8074 is a vulnerability in Yii 2.x before 2.0.15 that allows remote attackers to inject unintended search conditions via a variant of the CVE-2018-7269 attack in conjunction with the Elasticsearch extension.
CVE-2018-8074 affects Yii 2.x before version 2.0.15, specifically the yii2-elasticsearch package.
CVE-2018-8074 has a severity rating of 8.1 (High).
To fix CVE-2018-8074, you should update to Yii version 2.0.15 or apply the necessary security fixes.
Yes, you can find more information about CVE-2018-8074 at the following references: [1] [2] [3].