First published: Mon Oct 31 2011(Updated: )
A cross-site scripting (XSS) flaw was found in the way the regular expression engine of the JRuby, Java implementation of the Ruby programming language, processed certain invalid UTF-8 byte sequences. A remote attacker could use this flaw to execute arbitrary HTML or web script via specially-crafted input provided to an JRuby application. References: [1] <a href="http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html">http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=317435">https://bugs.gentoo.org/show_bug.cgi?id=317435</a> Proposed upstream solution (is to upgrage to jcodings-v1.0.3): [3] <a href="http://repo1.maven.org/maven2/org/jruby/jcodings/jcodings/1.0.3/jcodings-1.0.3.jar">http://repo1.maven.org/maven2/org/jruby/jcodings/jcodings/1.0.3/jcodings-1.0.3.jar</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems | =1.4.0-rc1 | |
Rubygems | =0.9.2 | |
Rubygems | =1.0.3 | |
Rubygems | =1.2.0 | |
Rubygems | =0.9.9 | |
Rubygems | =1.1.6-rc1 | |
Rubygems | =1.1 | |
Rubygems | =1.1-rc2 | |
Rubygems | =1.2.0-rc2 | |
Rubygems | =1.0.2 | |
Rubygems | =1.0.0-rc2 | |
Rubygems | =1.1-rc1 | |
Rubygems | =1.0.1 | |
Rubygems | =1.1-rc3 | |
Rubygems | =0.9.8 | |
Rubygems | =1.1.2 | |
Rubygems | =1.3.0-rc1 | |
Rubygems | =1.3.0 | |
Rubygems | =1.0.0-rc3 | |
Rubygems | =1.1.4 | |
Rubygems | =1.4.0-rc3 | |
Rubygems | =1.4.0-rc2 | |
Rubygems | =1.3.1 | |
Rubygems | =1.1.6 | |
Rubygems | =1.1.1 | |
Rubygems | =1.2.0-rc1 | |
Rubygems | =0.9.0 | |
Rubygems | =1.3.0-rc2 | |
Rubygems | =1.1.3 | |
Rubygems | =1.0.0-rc1 | |
Rubygems | =0.9.1 | |
Rubygems | <=1.4.0 | |
Rubygems | =1.1.5 | |
Rubygems | =1.0.0 | |
Rubygems | =1.1-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-1330 is classified as medium due to its potential for cross-site scripting attacks.
To fix CVE-2010-1330, upgrade JRuby to version 1.4.1 or later, which addresses the vulnerability.
CVE-2010-1330 affects multiple JRuby versions including 0.9.0 through 1.4.0-rc3.
CVE-2010-1330 can be exploited for cross-site scripting attacks, allowing remote attackers to execute arbitrary HTML or web scripts.
As of now, there are no publicly disclosed exploits specifically targeting CVE-2010-1330.