[wp-trac] Re: [WordPress Trac] #2591: users can enter dangerous serialized strings

WordPress Trac wp-trac at lists.automattic.com
Fri Mar 24 05:16:18 GMT 2006

#2591: users can enter dangerous serialized strings
       Id:  2591         |      Status:  assigned                
Component:  Security     |    Modified:  Fri Mar 24 05:16:18 2006
 Severity:  normal       |   Milestone:  2.1                     
 Priority:  normal       |     Version:  2.0.2                   
    Owner:  markjaquith  |    Reporter:  random                  
Changes (by markjaquith):

  * status:  new => assigned
  * owner:  anonymous => markjaquith


 Okay, I kludged it and made it skip serialization on options.php

 Also, user options are now serialized on update, which is really the area
 where there is the most danger of a malicious attack (someone with a
 subscriber profile inserts a 1 million member array and crashes the

 I thought of other ways of avoiding double serialization... there are GPL
 is_serialized() functions floating around, but they'd likely leave
 openings for abuse, as well as cause a lot of extra cycles on option
 updates... so a kludge for /wp-admin/options.php might actually be the
 best way.  Thoughts?

Ticket URL: <http://trac.wordpress.org/ticket/2591>
WordPress Trac <http://wordpress.org/>
WordPress blogging software

More information about the wp-trac mailing list