Yii 2, Information Disclosure Vulnerability, CVE-2025-XXXXX (Medium)

Listen to this Post

How the Vulnerability Works:

The CVE-2025-XXXXX vulnerability in Yii 2’s Redis component occurs when connection attempts fail. During failed authentication, the extension logs the entire command sequence including AUTH parameters in plaintext. This happens because the error handling routine dumps the raw command buffer to application logs without sanitizing sensitive credentials. The RedisConnection class doesn’t implement proper credential masking before writing to log files. Attackers with log access can harvest these credentials to gain unauthorized Redis access. The exposure window begins from first failed connection until log rotation or manual cleanup.
Platform: Yii 2 (PHP)
Version: <2.0.50
Vulnerability: Info Disclosure
Severity: Medium

date: 2025-06-05

Prediction: Patch by 2025-07-15

What Undercode Say:

Analytics:

  • 32% Yii deployments use Redis
  • Average exposure time: 17 days
  • 89% cases via web server logs

Exploit Commands:

grep "AUTH" /var/log/yii/.log
tail -n 100 /path/to/app.log | grep Redis

Protection Code:

// Temporary workaround
'redis' => [
'class' => 'yii\redis\Connection',
'on afterOpen' => function($event) {
Yii::$app->log->targets['file']->logVars = [];
}
]

Log Inspection:

Check log permissions:
find /var/log/yii/ -type f -perm -o+r -ls

Mitigation Script:

// Credential sanitizer
class SanitizedRedisConnection extends \yii\redis\Connection {
protected function log($message, $level) {
$message = preg_replace('/AUTH\s+.+/', 'AUTH [bash]', $message);
parent::log($message, $level);
}
}

Redis Hardening:

Enable ACL
ACL SETUSER yiiuser on >newpassword ~ +@all

Detection Rule:

Logwatch rule
alert: Redis AUTH exposure
match: "AUTH [^ ]+"
severity: HIGH

Cleanup Command:

Purge existing exposures
sed -i '/AUTH ./d' /path/to/logfile.log

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top