Red Hat Bugzilla – Bug 750306
CVE-2010-1330 jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences
Last modified: 2016-03-04 07:48:34 EST
A cross-site scripting (XSS) flaw was found in the way the regular expression engine of the JRuby, Java implementation of the Ruby programming language, processed certain invalid UTF-8 byte sequences. A remote attacker could use this flaw to execute arbitrary HTML or web script via specially-crafted input provided to an JRuby application.
Proposed upstream solution (is to upgrage to jcodings-v1.0.3):
This issue affects the versions of the jcodings package, as shipped with Fedora release of 14 and 15.
This issue did NOT affect the versions of the jcodings and jruby packages, as planned to be included into upcoming Fedora release of 16.
Created jcodings tracking bugs for this issue
Affects: fedora-14 [bug 750310]
Affects: fedora-15 [bug 750311]
This issue has been addressed in following products:
JBoss Enterprise SOA Platform 5.2.0
Via RHSA-2011:1456 https://rhn.redhat.com/errata/RHSA-2011-1456.html