CVE-2018-8073: yii2-redis Potential Remote code execution
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.75496%
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
yiisoft/yii2-redis | composer | < 2.0.8 | 2.0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly names these methods as vulnerable vectors. They handle user input that gets embedded into Redis
LUA scripts without proper validation()
. Since Redis
executes LUA scripts in a sandbox with limited capabilities, improper input sanitization in these ActiveRecord
methods could allow attackers to break out of intended query logic and execute arbitrary operations. The CWE-94
classification confirms this is a code injection scenario where attacker-controlled data influences script execution.