Hide Forgot
project_key: SOA The jruby.jar file shipped with the scripting_chain quickstart appears to be vulnerable to CVE-2010-1330: jboss-as/samples/quickstarts/scripting_chain/lib/jruby.jar I have been unable to determine the exact version of jruby.jar that we are shipping, as it doesn't match any of the upstream md5sums and the MANIFEST.MF does not specify the version. Based on what I can see in MANIFEST.MF and the unpacked structure of the jar, it is likely to be version 1.1.x or 1.2.0. To mitigate this flaw, we should upgrade to >= 1.4.1 or >= 1.5.0. Details are here: http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html Since this is a moderate impact flaw that only affects a quickstart, the overall impact is low. We should upgrade the vulnerable component in the next release. If it is possible to squeeze this update into 5.2.0 that would be ideal, but I'm not calling it a blocker.
Link: Added: This issue relates to JBESB-3706
Link: Added: This issue Cloned to SOA-3547
Link: Added: This issue Cloned to SOA-3548
Release Notes Docs Status: Added: Not Required Writer: Added: dlesage
Verified in CR1