Lucene search

K
githubGitHub Advisory DatabaseGHSA-WMQ2-JC9M-XP4M
HistoryMay 02, 2022 - 6:21 a.m.

Cross-site Scripting in in JRuby

2022-05-0206:21:36
CWE-79
GitHub Advisory Database
github.com
9

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.8%

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to ‘u’, does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Affected configurations

Vulners
Node
org.jruby\jrubyMatchcore
CPENameOperatorVersion
org.jruby:jruby-corelt1.4.1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.8%