The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=750306 | |
http://rhn.redhat.com/errata/RHSA-2011-1456.html | vendor advisory |
https://bugs.gentoo.org/show_bug.cgi?id=317435 | |
http://www.osvdb.org/77297 | vdb entry |
http://secunia.com/advisories/46891 | third party advisory vendor advisory |
http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html | exploit patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80277 | vdb entry |