#rubysec

2025-06-05

PSA: supply chain attacks (aka forking popular gems, changing the name slightly, and adding malicious code) are starting to show up on rubygems.org more often. Be cautious when adding a new gem to your project. Check who the author is, check the GitHub repository, look at the commit history, etc.
socket.dev/blog/malicious-ruby

#ruby #security #rubysec

2025-06-05

The so-called "supply chain attacks" (really just typosquatting) are starting to show up on rubygems.org. Luckily for the Ruby community all of the good gem names have already been taken🥁 /s.
socket.dev/blog/malicious-ruby

#ruby #security #infosec #rubysec

2025-01-06

Ruby's Bundler dependency manager now has checksum verification built-in to prevent cache poisoning attacks.
mensfeld.pl/2025/01/the-silent

#ruby #rubysec #bundler

2024-12-28

Someone found a Gem::SafeMarshal escape in Ruby! (Also, this blog is 🔥 for Ruby security research.)
nastystereo.com/security/ruby-

#ruby #rubysec #securityresearch #vulnerabilityresearch #deserializationvulnerability

2024-11-25

Note: before all of the script kiddies get their hopes up and think they can pwnxorize every Rails app, deserialization vulnerabilities in Ruby are actually quite rare these days due to Marshal.load almost never being used in the wild and YAML.load has been aliased to YAML.safe_load for some time now.
#rubysec #deserialization

2024-11-25

Ruby 3.4 Universal RCE Deserialization Gadget Chain
nastystereo.com/security/ruby-

#ruby #rubysec

2024-11-11

Catching up on ActiveRecord's new (circa 2023) encrypted column support (aka Encryption at Rest).
youtube.com/watch?v=IR2demNrMw

#rubysec #rails #encryption #encryptedatrest #encryptedstorage

2024-11-10

TIL using the <math> tag for XSS with HTML5 parsers.
youtube.com/watch?v=USPLEASZ0D

#rails #html5 #xss #rubysec

2024-11-09

If you want to know about the state of security in Ruby on Rails, checkout @gregmolnar's talk.
youtube.com/watch?v=Z3DgOix0rI

#rails #rubysec

2024-11-08

Liking the new "maintainer" role for rubygem maintainers.
blog.rubygems.org/2024/11/07/m

#rubygems #rubysec

2024-11-05

💣 Is your #Ruby app vulnerable? Is it a ticking time bomb or is it safe in production?

If you don’t know, you need a security audit. Find out how many vulnerabilities are present in your code and dependencies. Let's talk!

go.fastruby.io/wbw

#RubySec #InfoSec #DevSecOps

2024-11-02

Heads Up Everyone. An unpatched CVE for Sinatra was just added to ruby-advisory-db. Currently all versions are affected. Impact is a possible Open Redirect.
github.com/advisories/GHSA-hxx
#ruby #sinatra #rubysec

2024-09-24

Heads Up Everyone: there's an not-yet-patched-and-released security vulnerability in WEBrick. This is going to be added to ruby-advisory-db shortly, so don't be surprised if webrick starts getting flagged; although I'm guessing it's probably only in your Gemfile.lock due to some other gem pulling it in.

Update: webrick 1.8.2 has now been released.

github.com/advisories/GHSA-6f6

#ruby #rubysec #webrick

2024-04-24

Thank you to @havenwood for updating the ruby-versions repo for CVE-2024-27282! ruby-install users, please upgrade your ruby versions!

ruby-install --update
ruby-install ruby-3.0.7
ruby-install ruby-3.1.5
ruby-install ruby-3.2.4
ruby-install ruby-3.3.1

ruby-lang.org/en/news/2024/04/
#ruby #rubysec #cve #cve_2024_2782 #cve20242782

2024-03-29

PyPI temporarily halted new user signups in response to a surge in malicious typosquating packages. I suspect attackers will turn their sights to NPM and rubygems.org next.
arstechnica.com/security/2024/
#rubygems #rubysec

2024-03-14

💣 Is your #Ruby app vulnerable? Is it a ticking time bomb or is it safe in production?

go.fastruby.io/wbw

#RubySec #InfoSec #DevSecOps

2024-03-12

💣 Is your #Ruby app vulnerable? Is it a ticking time bomb or is it safe in production?

If you don’t know, you need a security audit. Find out how many vulnerabilities are present in your code and dependencies. Let's talk!

go.fastruby.io/wbw

#RubySec #InfoSec #DevSecOps

2024-03-04

Crisis [hopefully] averted: the maintainer added some guard logic for the vulnerability and released 1.16.6. Updated the entry in ruby-advisory-db.

#rubysec

2024-03-03

Plot Twist: the maintainer of json-jwt contests whether it's even possible to create a web app that's vulnerable to CVE-2023-51774, due to the differences between the decoded JWT and JWE objects. I pointed the maintainer to the instructions on how to dispute a CVE.
github.com/nov/json-jwt/issues

I reached out to the original reporter asking them to produce a PoC vulnerable app that can be exploited.
github.com/P3ngu1nW/CVE_Reques

Debating whether to remove the CVE from ruby-advisory-db before GHSA/NVD removes it.
#rubysec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst