zlacker

[parent] [thread] 4 comments
1. tinco+(OP)[view] [source] 2025-12-03 16:29:04
Unsafe deserialization is a very 2010 Ruby on Rails sort of vulnerability. It is strangely interesting that such a vulnerability was introduced so late in the lifetime of these frameworks. It must be a very sneaky vulnerability given how cautious we have become around deserialization since then.
replies(2): >>LunaSe+c2 >>Tomuus+T2
2. LunaSe+c2[view] [source] 2025-12-03 16:38:26
>>tinco+(OP)
I'm willing to bet that this is linked to the magic __proto__ object namespace in JavaScript
replies(1): >>jazzyp+O12
3. Tomuus+T2[view] [source] 2025-12-03 16:42:12
>>tinco+(OP)
The React Server Components wire format (Flight) is relatively novel and very new (it has existed in React stable for just a year). This is not a simple JSON parsing bug.
replies(1): >>tinco+66
◧◩
4. tinco+66[view] [source] [discussion] 2025-12-03 16:55:21
>>Tomuus+T2
The rails bugs weren't about Json parsing, they were deserializing into Ruby objects of classes that had side effects, and those side effects led to RCE possibilities. Since those happened, you'll find any deserialization library, especially in dynamic languages, will have a safe (or conversely unsafe) deserialize function to make it more explicit that there's risks involved.
◧◩
5. jazzyp+O12[view] [source] [discussion] 2025-12-04 05:56:59
>>LunaSe+c2
You win!
[go to top]