CVE-2010-1330 — Cross-site Scripting in Jruby
Severity
4.3MEDIUMNVD
EPSS
0.4%
top 37.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 23
Latest updateMay 2
Description
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
CVSS vector
AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
1Exploit-DB▶
Easy RM to MP3 2.7.3.700 - '.m3u' / '.pls' / '.smi' / '.wpl' / '.wax' / '.wvx' / '.ram' Local Overflow↗2010-08-04
📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2010-1330 jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences [fedora-15]↗2011-10-31
Bugzilla▶
CVE-2010-1330 jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences [fedora-14]↗2011-10-31
Bugzilla▶
CVE-2010-1330 jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences↗2011-10-31