Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Reflected Cross-site Scripting vulnerabilities in an interactive lesson.
Start learningUpgrade yiisoft/yii2 to version 2.0.50 or higher.
yiisoft/yii2 is a Yii PHP Framework.
Affected versions of this package are vulnerable to Reflected Cross-site Scripting through the mechanism for displaying function argument values in the stack trace. An attacker can execute arbitrary JavaScript code in the security context of the victim's site by crafting a link that manipulates the title attribute of a span tag to include malicious JavaScript through event handlers such as onmousemove.
Note:
For this vulnerability to be exploited, the following requirements must be met:
The framework is in debug mode (YII_DEBUG set to true);
The php.ini setting zend.exception_ignore_args is set to Off (default value);
An attacker induces an exception in the application, leading to a stack trace page being displayed.