January 2026
Insecure Ruby Deserialization Leading to RCE
Summary
Description
Vulnerable Code
data = Oj.load(job.payload)
RubitMQ.new(data).run()def run_find()
puts Open3.capture3("find", *@args)
endProof of Concept
Malicious Payload
Result
Flag
Impact Assessment
Confidentiality Impact: HIGH
Integrity Impact: HIGH
Availability Impact: HIGH
Root Causes
Recommendations
Last updated