SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Opera Vendors:   Opera Software
Opera URL Loading Script Backtick Parsing Lets Remote Users Execute Arbitrary Shell Commands
SecurityTracker Alert ID:  1015253
SecurityTracker URL:  http://securitytracker.com/id/1015253
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 22 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.x prior to 8.51
Description:   A vulnerability was reported in Opera. A remote user can cause arbitrary code to be executed on the target user's system.

The shell script that launches the Opera browser parses and executed shell commands that are enclosed with backtick characters. A remote user can create a specially crafted URL that, when loaded by the target user in a non-Opera application (such as an e-mail client), will execute arbitrary shell commands. The commands will run with the privileges of the target user.

UNIX/Linux-based systems are affected.

The vendor was notified on September 22, 2005.

Jakob Balle from Secunia Research discovered this vulnerability.

Impact:   A remote user can create a link that, when loaded by the target user via an application, will execute arbitrary shell commands on the target system with the privileges of the target user.
Solution:   The vendor has issued a fixed version (8.51), available at:

http://www.opera.com/download/

Vendor URL:  www.opera.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] Secunia Research: Opera Command Line URL Shell

====================================================================== 

                     Secunia Research 22/11/2005

         - Opera Command Line URL Shell Command Injection -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

Opera 8.x on Unix / Linux based environments.

Prior versions may also be affected.

====================================================================== 
2) Severity 

Rating: Highly Critical
Impact: System access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Opera, which can
be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the shell script used to launch
Opera parsing shell commands that are enclosed within backticks in
the URL provided via the command line. This can e.g. be exploited to
execute arbitrary shell commands by tricking a user into following a
malicious link in an external application which uses Opera as the
default browser (e.g. the mail client Evolution on Red Hat Enterprise
Linux 4).

This vulnerability can only be exploited on Unix / Linux based
environments.

This vulnerability is a variant of:
http://secunia.com/SA16869

====================================================================== 
4) Solution 

Update to version 8.51.
http://www.opera.com/download/

====================================================================== 
5) Time Table 

22/09/2005 - Initial vendor notification.
22/09/2005 - Initial vendor reply.
22/11/2005 - Vendor released patches.
22/11/2005 - Public disclosure.

====================================================================== 
6) Credits 

Originally discovered by:
Peter Zelezny

Discovered in Opera by:
Jakob Balle, Secunia Research

====================================================================== 
7) References

Secunia Advisory SA16869:
http://secunia.com/advisories/16869/

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-57/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC