Vulnerability CVE-2010-1330


Published: 2012-11-23

Description:
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Jruby -> Jruby 

 References:
http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html
https://bugzilla.redhat.com/show_bug.cgi?id=750306
https://bugs.gentoo.org/show_bug.cgi?id=317435
http://xforce.iss.net/xforce/xfdb/80277
http://www.osvdb.org/77297
http://secunia.com/advisories/46891
http://rhn.redhat.com/errata/RHSA-2011-1456.html

Copyright 2024, cxsecurity.com

 

Back to Top