CVE-2011-2711

Cross-site scripting (XSS) vulnerability in the print_fileinfo function in ui-diff.c in cgit 0.9.0.2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the filename associated with the rename hint.
References
Link Resource
http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5 Patch
http://hjemli.net/pipermail/cgit/2011-July/000276.html Patch
http://secunia.com/advisories/45358 Vendor Advisory
http://secunia.com/advisories/45541
http://www.openwall.com/lists/oss-security/2011/07/22/2 Patch
http://www.openwall.com/lists/oss-security/2011/07/22/6
http://www.openwall.com/lists/oss-security/2011/07/22/7 Patch
http://www.openwall.com/lists/oss-security/2011/07/24/3 Patch
http://www.openwall.com/lists/oss-security/2011/07/24/4 Patch
http://www.osvdb.org/74050 Patch
http://www.securityfocus.com/bid/48866
https://bugzilla.redhat.com/show_bug.cgi?id=725042 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68754
https://hermes.opensuse.org/messages/10998459
http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5 Patch
http://hjemli.net/pipermail/cgit/2011-July/000276.html Patch
http://secunia.com/advisories/45358 Vendor Advisory
http://secunia.com/advisories/45541
http://www.openwall.com/lists/oss-security/2011/07/22/2 Patch
http://www.openwall.com/lists/oss-security/2011/07/22/6
http://www.openwall.com/lists/oss-security/2011/07/22/7 Patch
http://www.openwall.com/lists/oss-security/2011/07/24/3 Patch
http://www.openwall.com/lists/oss-security/2011/07/24/4 Patch
http://www.osvdb.org/74050 Patch
http://www.securityfocus.com/bid/48866
https://bugzilla.redhat.com/show_bug.cgi?id=725042 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68754
https://hermes.opensuse.org/messages/10998459
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lars_hjemli:cgit:*:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.4:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.5:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.4:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.8.3.5:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.9:*:*:*:*:*:*:*
cpe:2.3:a:lars_hjemli:cgit:0.9.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5 - Patch () http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5 - Patch
References () http://hjemli.net/pipermail/cgit/2011-July/000276.html - Patch () http://hjemli.net/pipermail/cgit/2011-July/000276.html - Patch
References () http://secunia.com/advisories/45358 - Vendor Advisory () http://secunia.com/advisories/45358 - Vendor Advisory
References () http://secunia.com/advisories/45541 - () http://secunia.com/advisories/45541 -
References () http://www.openwall.com/lists/oss-security/2011/07/22/2 - Patch () http://www.openwall.com/lists/oss-security/2011/07/22/2 - Patch
References () http://www.openwall.com/lists/oss-security/2011/07/22/6 - () http://www.openwall.com/lists/oss-security/2011/07/22/6 -
References () http://www.openwall.com/lists/oss-security/2011/07/22/7 - Patch () http://www.openwall.com/lists/oss-security/2011/07/22/7 - Patch
References () http://www.openwall.com/lists/oss-security/2011/07/24/3 - Patch () http://www.openwall.com/lists/oss-security/2011/07/24/3 - Patch
References () http://www.openwall.com/lists/oss-security/2011/07/24/4 - Patch () http://www.openwall.com/lists/oss-security/2011/07/24/4 - Patch
References () http://www.osvdb.org/74050 - Patch () http://www.osvdb.org/74050 - Patch
References () http://www.securityfocus.com/bid/48866 - () http://www.securityfocus.com/bid/48866 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=725042 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=725042 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68754 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68754 -
References () https://hermes.opensuse.org/messages/10998459 - () https://hermes.opensuse.org/messages/10998459 -

Information

Published : 2011-08-03 00:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2711

Mitre link : CVE-2011-2711

CVE.ORG link : CVE-2011-2711


JSON object : View

Products Affected

lars_hjemli

  • cgit
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')