Opera Command Execution and Cross-Site Scripting

Posted on Friday, October 31, 2008 @ 02:29:38 PDT in Security
by Raven

SECUNIA ADVISORY ID: SA32452

VERIFY ADVISORY: http://secunia.com/advisories/32452/

CRITICAL: Highly critical

IMPACT: Cross Site Scripting, System access

SOFTWARE:
Opera 5.x - http://secunia.com/advisories/product/82/
Opera 6.x - http://secunia.com/advisories/product/81/
Opera 7.x - http://secunia.com/advisories/product/761/
Opera 8.x - http://secunia.com/advisories/product/4932/
Opera 9.x - http://secunia.com/advisories/product/10615/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system. The vulnerabilities are reported in versions prior to 9.62.

1) Certain parameters passed to the "History Search" functionality are not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which is executed in a user's browser session when the malicious data is being viewed. Successful exploitation allows e.g. changing Opera's preferences, which can further be exploited to execute arbitrary commands. This is related to vulnerability #1 in: SA32299

2) An error exists in the handling of javascript URLs in the Links panel, which can be exploited to conduct cross-site scripting attacks with pages containing frames.

SOLUTION: Update to version 9.62 (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Aviv Raff.
2) Reported by the vendor.

ORIGINAL ADVISORY: Opera: http://www.opera.com/support/search/view/906/ http://www.opera.com/support/search/view/907/
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 346,353,826
  • Today: 8,830
Server InfoServer Info
  • Jan 22, 2018
  • 04:29 am PST
 
 

Daily Inspiration