A cross-site scripting (XSS) flaw was found in the way the regular expression engine of the JRuby, Java implementation of the Ruby programming language, processed certain invalid UTF-8 byte sequences. A remote attacker could use this flaw to execute arbitrary HTML or web script via specially-crafted input provided to an JRuby application. References: [1] http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html [2] https://bugs.gentoo.org/show_bug.cgi?id=317435 Proposed upstream solution (is to upgrage to jcodings-v1.0.3): [3] http://repo1.maven.org/maven2/org/jruby/jcodings/jcodings/1.0.3/jcodings-1.0.3.jar
This issue affects the versions of the jcodings package, as shipped with Fedora release of 14 and 15. -- This issue did NOT affect the versions of the jcodings and jruby packages, as planned to be included into upcoming Fedora release of 16.
Created jcodings tracking bugs for this issue Affects: fedora-14 [bug 750310] Affects: fedora-15 [bug 750311]
This issue has been addressed in following products: JBoss Enterprise SOA Platform 5.2.0 Via RHSA-2011:1456 https://rhn.redhat.com/errata/RHSA-2011-1456.html