在PHP7中如何使用過(guò)濾unserialize()函數(shù)

2019-05-13 14:56 更新

unserialize - 從已存儲(chǔ)的表示中創(chuàng)建 PHP 的值

PHP7 引入了過(guò)濾 unserialize () 函數(shù),以便在不受信任的數(shù)據(jù)上反序列化對(duì)象時(shí)提供更好的安全性。它可以防止可能的代碼注入,并使開(kāi)發(fā)人員能夠?qū)⒖梢圆恍蛄谢念惲腥氚酌麊巍?/p>

示例

<?php
   class MyClass1 { 
      public $obj1prop;   
   }
   class MyClass2 {
      public $obj2prop;
   }

   $obj1 = new MyClass1();
   $obj1->obj1prop = 1;
   $obj2 = new MyClass2();
   $obj2->obj2prop = 2;

   $serializedObj1 = serialize($obj1);
   $serializedObj2 = serialize($obj2);

   // default behaviour that accepts all classes
   // second argument can be ommited.
   // if allowed_classes is passed as false, unserialize converts all objects into __PHP_Incomplete_Class object
   $data = unserialize($serializedObj1 , ["allowed_classes" => true]);

   // converts all objects into __PHP_Incomplete_Class object except those of MyClass1 and MyClass2
   $data2 = unserialize($serializedObj2 , ["allowed_classes" => ["MyClass1", "MyClass2"]]);

   print($data->obj1prop);
   print("<br/>");
   print($data2->obj2prop);
?>

它產(chǎn)生以下瀏覽器輸出:

1
2
以上內(nèi)容是否對(duì)您有幫助:
在線筆記
App下載
App下載

掃描二維碼

下載編程獅App

公眾號(hào)
微信公眾號(hào)

編程獅公眾號(hào)