[MAVEN:GHSA-WMQ2-JC9M-XP4M] Cross-site Scripting in in JRuby

Severity Moderate
Affected Packages 1
Fixed Packages 1
CVEs 1

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.

Package Affected Version
pkg:maven/org.jruby/jruby-core < 1.4.1
Package Fixed Version
pkg:maven/org.jruby/jruby-core = 1.4.1
ID
MAVEN:GHSA-WMQ2-JC9M-XP4M
Severity
moderate
URL
https://github.com/advisories/GHSA-wmq2-jc9m-xp4m
Published
2022-05-02T06:21:36
(2 years ago)
Modified
2023-01-28T05:00:57
(19 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jruby/jruby-core org.jruby jruby-core < 1.4.1
Fixed pkg:maven/org.jruby/jruby-core org.jruby jruby-core = 1.4.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...