. Implemented FR #72653 (SQLite should allow opening with empty filename).
(cmb)
+- Wddx:
+ . Fixed bug #72142 (WDDX Packet Injection Vulnerability in
+ wddx_serialize_value()). (Taoguang Chen)
+
21 Jul 2016, PHP 5.6.24
- Core:
--- /dev/null
+--TEST--
+Bug #72142: WDDX Packet Injection Vulnerability in wddx_serialize_value()
+--FILE--
+<?php
+
+$wddx = wddx_serialize_value('', '</comment></header><data><struct><var name="php_class_name"><string>stdClass</string></var></struct></data></wddxPacket>');
+var_dump($wddx);
+var_dump(wddx_deserialize($wddx));
+
+?>
+--EXPECT--
+string(301) "<wddxPacket version='1.0'><header><comment></comment></header><data><struct><var name="php_class_name"><string>stdClass</string></var></struct></data></wddxPacket></comment></header><data><string></string></data></wddxPacket>"
+string(0) ""
{
php_wddx_add_chunk_static(packet, WDDX_PACKET_S);
if (comment) {
+ char *escaped;
+ size_t escaped_len;
+ escaped = php_escape_html_entities(
+ comment, comment_len, &escaped_len, 0, ENT_QUOTES, NULL TSRMLS_CC);
+
php_wddx_add_chunk_static(packet, WDDX_HEADER_S);
php_wddx_add_chunk_static(packet, WDDX_COMMENT_S);
- php_wddx_add_chunk_ex(packet, comment, comment_len);
+ php_wddx_add_chunk_ex(packet, escaped, escaped_len);
php_wddx_add_chunk_static(packet, WDDX_COMMENT_E);
php_wddx_add_chunk_static(packet, WDDX_HEADER_E);
+
+ str_efree(escaped);
} else {
php_wddx_add_chunk_static(packet, WDDX_HEADER);
}