-
-
Notifications
You must be signed in to change notification settings - Fork 437
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UnserializeArray in Mage_Sales_Model_Quote_Item::compare causes exception and password leak #4383
Comments
@sreichel about the password leak, might be worth it to look into #[\SensitiveParameter] ? |
@Hanmac If you're interested MahoCommerce/maho@891b27d |
It does not work with php7. There is PR reday for it. I'll publish later. |
Mhhh, i cannot reproduce it on recent OM. At the end i have both items in cart w/o any logged exception. Please check your code ... "in app/code/core/Mage/Core/Helper/UnserializeArray.php on line 44" looks strange. Method |
@sreichel found the reason, it was an old exception happened because of old version of for password leak, also see this commit: |
Related to this: #4352 we should be careful what kind of strings we are trying to unserialize
Preconditions (*)
magento-lts/app/code/core/Mage/Sales/Model/Quote/Item.php
Lines 519 to 524 in c294b09
Steps to reproduce (*)
Expected result (*)
Actual result (*)
Because the Exception happens while logging in, the stacktrace does leak the username and password.
But this might be a different can of worms.
Solution
I would test if the string does look like a serialized array before calling unserialize
I'm going to make a PR soon
The text was updated successfully, but these errors were encountered: