|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #75007 Create an Unexpected Object in During WDDX Deserialization
Submitted: 2017-07-30 14:34 UTC Modified: 2020-12-05 16:20 UTC
Avg. Score:4.0 ± 1.0
Reproduced:0 of 1 (0.0%)
From: taoguangchen at icloud dot com Assigned: cmb (profile)
Status: Not a bug Package: WDDX related
PHP Version: 5.6.31 OS: *
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Bug Type:
From: taoguangchen at icloud dot com
New email:
PHP Version: OS:


 [2017-07-30 14:34 UTC] taoguangchen at icloud dot com
Create an Unexpected Object in During WDDX Deserialization

In During WDDX Deserialization, an unexpected object can be created via the crafted wddx pockets, and bypass __wakeup() method

class obj {
	function __wakeup() {

$wddx = <<<EOT
<?xml version='1.0'?>
<wddxPacket version='1.0'>
			<var name='php_class_name'>
			<var name='prop'>



Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2017-07-31 12:46 UTC]
Like unserialize, wddx_deserialize() must not be fed with untrusted input.
Consequently we don't consider bugs in wddx_deserialize security vulnerabilities.
Removing Private flag...
 [2017-08-02 17:23 UTC]
-Type: Security +Type: Bug
 [2020-12-05 16:20 UTC]
Actually, this is not even a bug; the behavior is documented and
it is warned against passing untrusted input to that function.
Also, the complete WDDX extension is deprecated and unbundled as
of PHP 7.4.0.
 [2020-12-05 16:20 UTC]
-Status: Open +Status: Not a bug -Assigned To: +Assigned To: cmb
 [2020-12-05 16:20 UTC]
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu May 30 05:01:31 2024 UTC