Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • HACKING
  • SLOT
  • CASINO
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • HACKING
  • SLOT
  • CASINO
  • SUBMIT
Crypto Flexs
Home»BLOCKCHAIN NEWS»Github: Understanding insecure deserialization vulnerabilities in Ruby projects
BLOCKCHAIN NEWS

Github: Understanding insecure deserialization vulnerabilities in Ruby projects

By Crypto FlexsJune 21, 20243 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Github: Understanding insecure deserialization vulnerabilities in Ruby projects
Share
Facebook Twitter LinkedIn Pinterest Email





An insecure deserialization vulnerability in the Ruby project could allow an attacker to execute arbitrary commands on a remote server by sending JSON data. According to the GitHub blog, these vulnerabilities occur when the deserialization process allows instantiation of arbitrary classes or class-like structures specified in the serialized data.

How unsafe deserialization works

In Ruby, unsafe deserialization vulnerabilities are often exploited through libraries that support polymorphism, such as the Oj JSON serialization library. By chaining multiple classes together, an attacker can execute code on the system under attack. These classes, known as gadgets, are combined into gadget chains to form larger attacks.

For example, when using the Oj library to deserialize JSON, you may be vulnerable if your project contains the following configuration:

data = Oj.load(untrusted_json)

The Oj library supports instantiation of classes specified in JSON by default, which can be disabled using: Oj.safe_load Instead of.

To demonstrate how this works, consider the following class: SimpleClass and hash Method to execute command:

class SimpleClass
  def initialize(cmd)
    @cmd = cmd
  end

  def hash
    system(@cmd)
  end
end

The JSON payload that instantiates this class is:


    "^o": "SimpleClass",
    "cmd": "open -a calculator"

Load this JSON using: Oj.load doesn’t trigger hash Executes the method directly, but placing a class as a key inside the hash can trigger the method.

Oj.load(json_payload)

This will execute the command specified next. @cmd Member variable.

Building a Detection Gadget

You can build a chain of detection gadgets to detect insecure deserialization vulnerabilities. For example, a class like this: Gem::Requirement Can be used. hash method to call to_s About internal members. By generating the appropriate JSON payload, this chain can be triggered to detect vulnerabilities.

Detection gadgets can also be extended to a complete remote code execution (RCE) chain. This includes using classes and methods that are part of Ruby or its dependencies to execute arbitrary commands.

Avoid unsafe deserialization

To avoid these vulnerabilities, it is important to use a safe deserialization method. for example, Oj.safe_load Instead of Oj.load It can prevent instantiation of arbitrary classes. Additionally, tools like CodeQL can help detect unsafe deserialization by analyzing your source code for vulnerable patterns.

For developers with access to the source code, scanning code on GitHub using CodeQL can identify unsafe deserialization sinks. If you don’t have access to the source code, you can use detection gadgets to identify vulnerabilities remotely.

Understanding how insecure deserialization works and implementing secure coding practices can help prevent these vulnerabilities. For more detailed examples and detection methodology, see the original blog post on the GitHub blog.

Image source: Shutterstock



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Rabby Wallet integrates XRPL EVM chain with peersyst

September 15, 2025

Skale Labs fairly publishes a technical white paper and introduces the industry’s first “encryption proof” consensus protocol.

September 10, 2025

Coindesk July 2025 Report: Stablecoins and CBDC

September 5, 2025
Add A Comment

Comments are closed.

Recent Posts

What is the next after the Fed’s 25bps is cut? Everything you need to know

September 18, 2025

The XRP market value surpasses Shopify, Verizon, and Citigroup. Whales sell 40m coins.

September 18, 2025

Green Hood Contracts Thanksgiving Summary -Ackee Blockchain

September 17, 2025

BetFury Is At SBC Summit Lisbon 2025: Affiliate Growth In Focus

September 17, 2025

FED Mining’s Cloud Mining Platform Is Helping Users Earn $8,800 Per Day, And XRP’s Growth Is Driving Market Enthusiasm.

September 17, 2025

Stablecoin Holdings Drop As Investors Pivot To SOL, XRP, And Altcoins

September 17, 2025

Flipster Partners With WLFI To Advance Global Stablecoin Adoption Through USD1 Integration

September 17, 2025

Zircuit Launches $495K Grants Program To Accelerate Web3 Super Apps

September 16, 2025

Kintsu Launches SHYPE On Hyperliquid

September 16, 2025

New Cryptocurrency Mutuum Finance (MUTM) Raises $15.8M As Phase 6 Reaches 40%

September 16, 2025

How XRP Enthusiasts Can Earn $15k/Day

September 16, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

What is the next after the Fed’s 25bps is cut? Everything you need to know

September 18, 2025

The XRP market value surpasses Shopify, Verizon, and Citigroup. Whales sell 40m coins.

September 18, 2025

Green Hood Contracts Thanksgiving Summary -Ackee Blockchain

September 17, 2025
Most Popular

🔴Satoshi is back?! | Cryptocurrency News of the Week – October 9, 2023

December 1, 2023

Coinbase is notifying some of its customers that it has received subpoenas related to Bybit.

November 29, 2023

The DOJ claims Tornado Cash operates as a “commercial enterprise.”

April 28, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.