'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-10-28 | |
| Rule Name: | PHP Deserialization Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | PHP deserialization injection occurs when an attacker supplies a crafted serialized string that, upon the server calling unserialize(), reconstructs objects whose magic methods or unsafe property usage are abused to execute arbitrary code or perform file/IO operations—leading to RCE, sensitive data exposure, session/privilege tampering, and persistent backdoors. This rule detected suspected PHP deserialization content in a cookie. | |
| Impact: | An attacker can carefully construct malicious serialized data and pass it to the application, and execute the malicious code constructed by the attacker when the application deserializes the object. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |