Skip to content
Permalink
Browse files

Fix object injection vulnerability

  • Loading branch information...
yurabakhtin committed Oct 3, 2016
1 parent b9545bc commit 999b5ad1d59760d7e450ceb541f55432fc74cd27
Showing with 1 addition and 1 deletion.
  1. +1 −1 htsrv/call_plugin.php
@@ -36,7 +36,7 @@
}
else
{ // Params given:
if( ( substr( $params, 0, 2 ) == 'a:' ) && ( ! preg_match( '/(;|{|})O:\+?[0-9]+:"/', $params ) ) )
if( ( substr( $params, 0, 2 ) == 'a:' ) && ( ! preg_match( '/(s:\d+:"[^"]*"|i:\d+)(;|{|})O:\+?[0-9]+:"/', $params ) ) )
{ // Allow to unserialize only arrays + check there is no Object in the array (We NEVER want to unserialize an object)
// (This may result in "false", but this means that unserializing failed)
$params = @unserialize( $params );

0 comments on commit 999b5ad

Please sign in to comment.
You can’t perform that action at this time.