| Summary: | dev-vcs/git: Persistent XSS by users with commit privileges (CVE-2011-2186) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | trivial | CC: | alexanderyt, ricmm, robbat2 |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.openwall.com/lists/oss-security/2011/06/03/7 | ||
| Whiteboard: | C4 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Tim Sammut (RETIRED)
2011-06-12 21:05:45 UTC
security: Which versions of Git are affected by this? I don't see any mention in the Git logs of this CVE. This would not be fixed as upstream says, however, that have talked about changing default value of prevent_xss from 0 to 1(if it is set to 1 - issue is gone), so from 1.6.*(when prevent_xss was introduced, not sure in which minor version) users can workaround this bug. per the previous comment this issue is something the user can work around locally. most importantly, commit access must be granted in order for the XSS to be effective |