Описание
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=750306jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences
EPSS
Процентиль: 62%
0.00425
Низкий
5 Medium
CVSS2
Связанные уязвимости
nvd
около 13 лет назад
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
debian
около 13 лет назад
The regular expression engine in JRuby before 1.4.1, when $KCODE is se ...
EPSS
Процентиль: 62%
0.00425
Низкий
5 Medium
CVSS2