Remote code execution in case application calls unserialize() on user input containing specially crafted string.
2.0.38
Add the following to BatchQueryResult.php:
public function __sleep()
{
throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
}
public function __wakeup()
{
throw new \BadMethodCallException('Cannot unserialize '.__CLASS__);
}
If you have any questions or comments about this advisory, contact us through security form.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
],
"github_reviewed_at": "2020-09-15T18:19:44Z",
"nvd_published_at": null,
"severity": "HIGH"
}