Insecure Deserialization

Lab: Arbitrary objection injection in PHP

When view the sitemap, we can see that there is a suspicious looking PHP file

After adding ~to the end of the path, we can see the source code of the PHP file. From there we can see the __deconstruct()function which will unlinkthe file.

Now, we will login to get the session cookie.

Next, we will replace the session cookie with this

Last updated