Ravens PHP Scripts

Opera Command Execution and Cross-Site Scripting
Date: Friday, October 31, 2008 @ 01:29:38 CET
Topic: Security


SECUNIA ADVISORY ID: SA32452

VERIFY ADVISORY: http://secunia.com/advisories/32452/

CRITICAL: Highly critical

IMPACT: Cross Site Scripting, System access

SOFTWARE:
Opera 5.x - http://secunia.com/advisories/product/82/
Opera 6.x - http://secunia.com/advisories/product/81/
Opera 7.x - http://secunia.com/advisories/product/761/
Opera 8.x - http://secunia.com/advisories/product/4932/
Opera 9.x - http://secunia.com/advisories/product/10615/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system. The vulnerabilities are reported in versions prior to 9.62.



1) Certain parameters passed to the "History Search" functionality are not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which is executed in a user's browser session when the malicious data is being viewed. Successful exploitation allows e.g. changing Opera's preferences, which can further be exploited to execute arbitrary commands. This is related to vulnerability #1 in: SA32299

2) An error exists in the handling of javascript URLs in the Links panel, which can be exploited to conduct cross-site scripting attacks with pages containing frames.

SOLUTION: Update to version 9.62 (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Aviv Raff.
2) Reported by the vendor.

ORIGINAL ADVISORY: Opera: http://www.opera.com/support/search/view/906/ http://www.opera.com/support/search/view/907/






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3485