4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.005 Low
EPSS
Percentile
75.8%
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to ‘u’, does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
CPE | Name | Operator | Version |
---|---|---|---|
org.jruby:jruby-core | lt | 1.4.1 |
rhn.redhat.com/errata/RHSA-2011-1456.html
secunia.com/advisories/46891
www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html
www.osvdb.org/77297
bugs.gentoo.org/show_bug.cgi?id=317435
bugzilla.redhat.com/show_bug.cgi?id=750306
exchange.xforce.ibmcloud.com/vulnerabilities/80277
github.com/advisories/GHSA-wmq2-jc9m-xp4m
nvd.nist.gov/vuln/detail/CVE-2010-1330