FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

yii -- Remote arbitrary PHP code execution

Affected packages
yii < 1.1.15

Details

VuXML ID 5a35bc56-7027-11e4-a4a3-001999f8d30b
Discovery 2014-07-03
Entry 2014-11-19

Yii PHP Framework developers report:

We are releasing Yii 1.1.15 to fix a security issue found in 1.1.14. We urge all 1.1.14 users to upgrade their Yii to this latest release. Note that the issue only affects 1.1.14. All previous releases are not affected. Upgrading to this release from 1.1.14 is very safe and will not break your existing code.

The vulnerability is in the CDetailView widget. When a Yii application uses this widget and configures the "value" property of a CDetailView attribute using end user inputs, it may allow attackers to potentially execute arbitrary PHP scripts on the server. We are not showing how to exploit it here to allow users to upgrade before details about the exploit become publicly known. To our knowledge the details of this issue are only known to core team members.

References

CVE Name CVE-2014-4672
URL http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix