Unserialization can result in code being loaded and executed due to * > object instantiation and autoloading, and a malicious user may be able * > to exploit this. * * The natural way to stop that from happening is to just refuse to unserialize * stuff by default. Which is what we're doing for anything that's not scalar. * * @var bool */ public static $safe_mode = true; public static $options = [true]; public function getTypes() { return ['string']; } public function getTriggers() { return Parser::TRIGGER_SUCCESS; } public function parse(&$var, Value &$o, $trigger) { $trimmed = \rtrim($var); if ('N;' !== $trimmed && !\preg_match('/^(?:[COabis]:\\d+[:;]|d:\\d+(?:\\.\\d+);)/', $trimmed)) { return; } if (!self::$safe_mode || !\in_array($trimmed[0], ['C', 'O', 'a'], true)) { // Second parameter only supported on PHP 7 if (KINT_PHP70) { // Suppress warnings on unserializeable variable $data = @\unserialize($trimmed, self::$options); } else { $data = @\unserialize($trimmed); } if (false === $data && 'b:0;' !== \substr($trimmed, 0, 4)) { return; } } $base_obj = new Value(); $base_obj->depth = $o->depth + 1; $base_obj->name = 'unserialize('.$o->name.')'; if ($o->access_path) { $base_obj->access_path = 'unserialize('.$o->access_path; if (!KINT_PHP70 || self::$options === [true]) { $base_obj->access_path .= ')'; } elseif (self::$options === [false]) { $base_obj->access_path .= ', false)'; } else { $base_obj->access_path .= ', Serialize::$options)'; } } $r = new Representation('Serialized'); if (isset($data)) { $r->contents = $this->parser->parse($data, $base_obj); } else { $base_obj->hints[] = 'blacklist'; $r->contents = $base_obj; } $o->addRepresentation($r, 0); } }