[MAVEN:GHSA-WMQ2-JC9M-XP4M] Cross-site Scripting in in JRuby
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Package | Affected Version |
---|---|
pkg:maven/org.jruby/jruby-core | < 1.4.1 |
Package | Fixed Version |
---|---|
pkg:maven/org.jruby/jruby-core | = 1.4.1 |
- ID
- MAVEN:GHSA-WMQ2-JC9M-XP4M
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-wmq2-jc9m-xp4m
- Published
-
2022-05-02T06:21:36
(2 years ago) - Modified
-
2023-01-28T05:00:57
(19 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jruby/jruby-core | org.jruby | jruby-core | < 1.4.1 | |||
Fixed | pkg:maven/org.jruby/jruby-core | org.jruby | jruby-core | = 1.4.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |