First published: Mon Oct 31 2011(Updated: )
A cross-site scripting (XSS) flaw was found in the way the regular expression engine of the JRuby, Java implementation of the Ruby programming language, processed certain invalid UTF-8 byte sequences. A remote attacker could use this flaw to execute arbitrary HTML or web script via specially-crafted input provided to an JRuby application. References: [1] <a href="http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html">http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=317435">https://bugs.gentoo.org/show_bug.cgi?id=317435</a> Proposed upstream solution (is to upgrage to jcodings-v1.0.3): [3] <a href="http://repo1.maven.org/maven2/org/jruby/jcodings/jcodings/1.0.3/jcodings-1.0.3.jar">http://repo1.maven.org/maven2/org/jruby/jcodings/jcodings/1.0.3/jcodings-1.0.3.jar</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems | <1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-750306 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix REDHAT-BUG-750306, update JRuby to a version higher than 1.4.1.
REDHAT-BUG-750306 is a cross-site scripting (XSS) vulnerability.
An attacker could exploit REDHAT-BUG-750306 to execute arbitrary HTML or web scripts remotely.
REDHAT-BUG-750306 affects JRuby versions up to, but not including, 1.4.1.