Opera 'javascript:' URL Access Control Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks and Access Files on a Target User's System
|
SecurityTracker Alert ID: 1014238 |
SecurityTracker URL: http://securitytracker.com/id/1014238
|
CVE Reference:
CVE-2005-1669
(Links to External Site)
|
Date: Jun 19 2005
|
Impact:
Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 8.0.1095
|
Description:
A vulnerability was reported in the Opera web browser. A remote user can conduct cross-site scripting attacks. A remote user can also read local files.
A remote user can create specially crafted HTML that, when loaded by the target user, will open a 'javascript:' URL in a frame or a new window with elevated privileges. This can be exploited to execute arbitrary scripting code in an arbitrary domain. It can also be exploited to access files on the target user's system.
The vendor was notified on May 18, 2005.
Jakob Balle of Secunia Research discovered this vulnerability.
The original advisory is available at:
http://secunia.com/secunia_research/2005-5/advisory/
|
Impact:
A remote user can cause arbitrary scripting code to be executed on the target user's system in an arbitrary domain.
A remote user can access files on the target user's system.
|
Solution:
The vendor has issued a fixed version (8.01), available at:
http://www.opera.com/download/
|
Vendor URL: www.opera.com/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|