Description
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
Remediation
References
http://rhn.redhat.com/errata/RHSA-2011-1456.html
http://secunia.com/advisories/46891
http://www.jruby.org/2010/04/26/jruby-1-4-1-xss-vulnerability.html
http://www.osvdb.org/77297
https://bugs.gentoo.org/show_bug.cgi?id=317435
https://bugzilla.redhat.com/show_bug.cgi?id=750306
https://exchange.xforce.ibmcloud.com/vulnerabilities/80277
Related Vulnerabilities
CVE-2023-45135 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web-war
CVE-2023-31062 Vulnerability in maven package org.apache.inlong:manager-dao
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-dbcp-base
CVE-2023-37952 Vulnerability in maven package com.mabl.integration.jenkins:mabl-integration
CVE-2023-46604 Vulnerability in maven package org.apache.activemq:activemq-openwire-legacy