You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When unserialize() is used on user supplied data it often leads to PHP Object Injection.
Attacker may generate a string of serialized object and parse it to server backend via $_COOKIE['salt'] by submitting a login request. Then func unserialize() will trigger __wakeup() and __destruct() method in serialized obj, resulting in code execution.
Please check other places where the function unserialize() is used.
The text was updated successfully, but these errors were encountered:
https://github.com/intelliants/subrion/blob/develop/includes/classes/ia.core.users.php#L709
When
unserialize()
is used on user supplied data it often leads to PHP Object Injection.Attacker may generate a string of serialized object and parse it to server backend via
$_COOKIE['salt']
by submitting a login request. Then funcunserialize()
will trigger__wakeup()
and__destruct()
method in serialized obj, resulting in code execution.Please check other places where the function
unserialize()
is used.The text was updated successfully, but these errors were encountered: