When unserialize() is used on user supplied data it often leads to PHP Object Injection.
Attacker may generate a string of serialized object and parse it to server backend via $_COOKIE['salt'] by submitting a login request. Then func unserialize() will trigger __wakeup() and __destruct() method in serialized obj, resulting in code execution.
Please check other places where the function unserialize() is used.
The text was updated successfully, but these errors were encountered:
https://github.com/intelliants/subrion/blob/develop/includes/classes/ia.core.users.php#L709
When
unserialize()is used on user supplied data it often leads to PHP Object Injection.Attacker may generate a string of serialized object and parse it to server backend via
$_COOKIE['salt']by submitting a login request. Then funcunserialize()will trigger__wakeup()and__destruct()method in serialized obj, resulting in code execution.Please check other places where the function
unserialize()is used.The text was updated successfully, but these errors were encountered: