Reflected Cross-site Scripting Affecting yiisoft/yii2 package, versions >=2.0.49.3, <2.0.50


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Reflected Cross-site Scripting vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-YIISOFTYII2-7172127
  • published31 May 2024
  • disclosed30 May 2024
  • creditAntiphishing

Introduced: 30 May 2024

CVE-2024-32877  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade yiisoft/yii2 to version 2.0.50 or higher.

Overview

yiisoft/yii2 is a Yii PHP Framework.

Affected versions of this package are vulnerable to Reflected Cross-site Scripting through the mechanism for displaying function argument values in the stack trace. An attacker can execute arbitrary JavaScript code in the security context of the victim's site by crafting a link that manipulates the title attribute of a span tag to include malicious JavaScript through event handlers such as onmousemove.

Note:

For this vulnerability to be exploited, the following requirements must be met:

  1. The framework is in debug mode (YII_DEBUG set to true);

  2. The php.ini setting zend.exception_ignore_args is set to Off (default value);

  3. An attacker induces an exception in the application, leading to a stack trace page being displayed.

References

CVSS Scores

version 3.1