Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Reflected Cross-site Scripting vulnerabilities in an interactive lesson.
Start learningUpgrade yiisoft/yii2
to version 2.0.50 or higher.
yiisoft/yii2 is a Yii PHP Framework.
Affected versions of this package are vulnerable to Reflected Cross-site Scripting through the mechanism for displaying function argument values in the stack trace. An attacker can execute arbitrary JavaScript code in the security context of the victim's site by crafting a link that manipulates the title
attribute of a span tag to include malicious JavaScript through event handlers such as onmousemove
.
Note:
For this vulnerability to be exploited, the following requirements must be met:
The framework is in debug mode (YII_DEBUG
set to true
);
The php.ini
setting zend.exception_ignore_args
is set to Off
(default value);
An attacker induces an exception in the application, leading to a stack trace page being displayed.