2016
09-20

PHP7過濾unserialize()

清華大佬耗費三個月吐血整理的幾百G的資源,免費分享!....>>>

PHP7引入了過濾 unserialize()函數(shù)以在反序列化不受信任的數(shù)據(jù)對象時提供更好的安全性。它可以防止可能的代碼注入,使開發(fā)人員能夠使用序列化白名單類。

示例

<?php
class MyClass1 { 
   public $obj1prop;   
}
class MyClass2 {
   public $obj2prop;
}


$obj1 = new MyClass1();
$obj1->obj1prop = 1;
$obj2 = new MyClass2();
$obj2->obj2prop = 2;

$serializedObj1 = serialize($obj1);
$serializedObj2 = serialize($obj2);

// default behaviour that accepts all classes
// second argument can be ommited.
// if allowed_classes is passed as false, unserialize converts all objects into __PHP_Incomplete_Class object
$data = unserialize($serializedObj1 , ["allowed_classes" => true]);

// converts all objects into __PHP_Incomplete_Class object except those of MyClass1 and MyClass2
$data2 = unserialize($serializedObj2 , ["allowed_classes" => ["MyClass1", "MyClass2"]]);

print($data->obj1prop);
print("<br/>");
print($data2->obj2prop);
?>

這將在瀏覽器產(chǎn)生以下輸出 -

1
2

掃碼二維碼 獲取免費視頻學(xué)習(xí)資料

編程學(xué)習(xí)