SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
(Vendor Issues Fix) Opera Lets Remote Users Inject Content into Open Windows
SecurityTracker Alert ID:  1012481
SecurityTracker URL:  http://securitytracker.com/id/1012481
CVE Reference:   CVE-2004-1157   (Links to External Site)
Date:  Dec 11 2004
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.54
Description:   A vulnerability was reported in Opera. A remote user can inject content into an open window in certain cases to spoof web site contents.

Secunia Research reported that if the target name of an open window is known, a remote user can create Javascript that, when loaded by the target user, will display arbitrary content in the opened window. A remote user can exploit this to spoof the content of potentially trusted web sites.

A demonstration exploit test is available at:

http://secunia.com/multiple_browsers_window_injection_vulnerability_test/

The vendor was notified on November 19, 2004.

Impact:   A remote user can inject arbitrary content into an open window in certain cases to spoof web site contents.
Solution:   The vendor has issued a fixed version (7.54u1), available at:

http://www.opera.com/download/

Vendor URL:  www.opera.com/support/search/supsearch.dml?index=782 (Links to External Site)
Cause:   Access control error
Underlying OS:  BeOS, Linux (Any), Apple (Legacy "classic" Mac), QNX, UNIX (FreeBSD), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Dec 8 2004 Opera Lets Remote Users Inject Content into Open Windows



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC