1--TEST-- 2Bug #72142: WDDX Packet Injection Vulnerability in wddx_serialize_value() 3--SKIPIF-- 4<?php if (!extension_loaded("wddx")) print "skip"; ?> 5--FILE-- 6<?php 7 8$wddx = wddx_serialize_value('', '</comment></header><data><struct><var name="php_class_name"><string>stdClass</string></var></struct></data></wddxPacket>'); 9var_dump($wddx); 10var_dump(wddx_deserialize($wddx)); 11 12?> 13--EXPECT-- 14string(301) "<wddxPacket version='1.0'><header><comment></comment></header><data><struct><var name="php_class_name"><string>stdClass</string></var></struct></data></wddxPacket></comment></header><data><string></string></data></wddxPacket>" 15string(0) "" 16