Gem::SafeMarshal escape / nastystereo.com

Python Serialization Vulnerabilities - Pickle - Hacking Articles
Introduction Serialization gathers data from objects, converts them to a string of bytes, and writes to disk. The data can be deserialized and the original
Hacking ArticlesBlue Mockingbird Monero-Mining Campaign Exploits Web Apps
The cybercriminals are using a deserialization vulnerability, CVE-2019-18935, to achieve remote code execution before moving laterally through the enterprise.
Threatpost - English - Global - threatpost.com