CVE-2010-1330

The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jruby:jruby:*:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:beta1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.1.6:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:1.4.0:rc3:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2011-1456.html - () http://rhn.redhat.com/errata/RHSA-2011-1456.html -
References () http://secunia.com/advisories/46891 - Vendor Advisory () http://secunia.com/advisories/46891 - Vendor Advisory
References () http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html - Exploit, Patch, Vendor Advisory () http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html - Exploit, Patch, Vendor Advisory
References () http://www.osvdb.org/77297 - () http://www.osvdb.org/77297 -
References () https://bugs.gentoo.org/show_bug.cgi?id=317435 - () https://bugs.gentoo.org/show_bug.cgi?id=317435 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=750306 - () https://bugzilla.redhat.com/show_bug.cgi?id=750306 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80277 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80277 -

Information

Published : 2012-11-23 19:55

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1330

Mitre link : CVE-2010-1330

CVE.ORG link : CVE-2010-1330


JSON object : View

Products Affected

jruby

  • jruby
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')