PHP filter unserialize()
PHP filter unserialize()
PHP 7 adds a feature that can provide filtering for unserialize(), which can prevent code injection of illegal data and provide safer deserialization Data
Example
<?php class MyClass1 { public $obj1prop; } class MyClass2 { public $obj2prop; } $obj1 = new MyClass1(); $obj1->obj1prop = 1; $obj2 = new MyClass2(); $obj2->obj2prop = 2; $serializedObj1 = serialize($obj1); $serializedObj2 = serialize($obj2); // 默認(rèn)行為是接收所有類(lèi) // 第二個(gè)參數(shù)可以忽略 // 如果 allowed_classes 設(shè)置為 false, unserialize 會(huì)將所有對(duì)象轉(zhuǎn)換為 __PHP_Incomplete_Class 對(duì)象 $data = unserialize($serializedObj1 , ["allowed_classes" => true]); // 轉(zhuǎn)換所有對(duì)象到 __PHP_Incomplete_Class 對(duì)象,除了 MyClass1 和 MyClass2 $data2 = unserialize($serializedObj2 , ["allowed_classes" => ["MyClass1", "MyClass2"]]); print($data->obj1prop); print(PHP_EOL); print($data2->obj2prop); ?>
The execution output of the above program is:
1
2
2