Open herwinw opened 1 year ago
I can understand what you want to say but it breaks backward compatibility.
And the marshaling isn't happen unless a user writes include XMLRPC::Marshallable
explicitly. It acts like that the marshaling is disabled by default (it's not done implicitly).
Gonna inject my 50 cents in this discussion since it's a bit related to the Marshalling issues.
Considering the fact that this gem is pretty wildly used, would it make sense to issue an CVE for the pre 0.3.3 version. So security scanners could flag outdated dependencies?
Given the plethora of cases about possible RCE vulnerabilities that have led to the 0.3.3 release, I would like to argue that the default object marshalling is incorrect.
Beside the security related issues, there is also the issue that XML-RPC is a language agnostic protocol, and the Ruby object marshalling is a Ruby only extension. It would not make any sense to serialize a Ruby object when the server is running Perl, Python or any other language that is not Ruby. The other XML-RPC extensions (8 byte integers, nil serialization, nil deserialization) are disabled by default as well.
Of course, I might be totally wrong here. Are there any people who actually use the object serialization of this gem?