An cross-site scripting (XSS) flaw was found in the way cgit, a fast web interface for Git, processed the file name in the rename hint. A remote attacker, valid CGit user with push access to the repository, could use this flaw to execute arbitrary web script or HTML code via a push commit message, renaming some file to a file with specially-crafted file name. References: [1] http://hjemli.net/pipermail/cgit/2011-July/000276.html
This issue affected the versions of the cgit package, as shipped with Fedora release of 14 and 15. The relevant cgit package updates for Fedora-14 and Fedora-15 has been already scheduled (cgit-0.9.0.2-2.fc14, cgit-0.9.0.2-2.fc15) and once they have passed the required testing phase, they will be pushed to Fedora -stable repository. -- This issue affected the versions of the cgit package, as present within EPEL-5 and EPEL-6 repositories. The relevant cgit package updates for EPEL-5 and EPEL-6 has been already scheduled (cgit-0.9.0.2-2.el5, cgit-0.9.0.2-2.el6).
CVE Request: [2] http://www.openwall.com/lists/oss-security/2011/07/22/2
The CVE identifier of CVE-2011-2711 has been assigned to this issue: [3] http://www.openwall.com/lists/oss-security/2011/07/22/6
Lukas Fleischer, the original issue reporter has suggested in: [4] http://www.openwall.com/lists/oss-security/2011/07/22/7 that original issue description in comment #0 of this bug was inappropriate. So have updated it to reflect it can be exploited only by an user with push access to the repository.