First published: Mon Sep 14 2020(Updated: )
### Impact Remote code execution in case application calls `unserialize()` on user input containing specially crafted string. ### Patches 2.0.38 ### Workarounds Add the following to BatchQueryResult.php: ```php public function __sleep() { throw new \BadMethodCallException('Cannot serialize '.__CLASS__); } public function __wakeup() { throw new \BadMethodCallException('Cannot unserialize '.__CLASS__); } ``` ### For more information If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/yiisoft/yii2 | <2.0.38 | |
Yiiframework Yii | <2.0.38 | |
composer/yiisoft/yii2 | <2.0.38 | 2.0.38 |
<2.0.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-15148.
The severity of CVE-2020-15148 is critical.
The affected software of CVE-2020-15148 is Yii 2 (yiisoft/yii2) before version 2.0.38.
CVE-2020-15148 allows remote code execution by calling `unserialize()` on arbitrary user input.
To fix CVE-2020-15148, upgrade to version 2.0.38 of Yii 2 (yiisoft/yii2) or apply the suggested workaround in the linked advisory.