top | item 44960942

Marshal madness: A brief history of Ruby deserialization exploits

25 points| pentestercrab | 6 months ago |blog.trailofbits.com

4 comments

order

kayodelycaon|6 months ago

I thought Marshal and non-safe yaml are fundamentally unsafe. You’re allowing input to instantiate arbitrary objects. It’s relatively easy to find an exploitable class.

Python’s pickle function is equivalent and has a warning about this.

Alifatisk|6 months ago

Does Marshal dumps work across different computers or is it only compitable with the same computer that dumped the Marshal?

zoky|6 months ago

As a general rule they will work anywhere, as long as the major version of the Marshal format is the same, and this hasn’t changed since Ruby 1.8. I expect if it ever did change (I can’t see any reason for it to ever do so though) there would probably be some sort of backwards compatibility available, as the Ruby community really hates making breaking changes between language versions, especially without offering some kind of relatively easy solution for making older code work.