| VID |
28647 |
| Severity |
30 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Opera Web browser, according to its version number, has a remote location object cross-domain scripting vulnerability. Opera is a Web browser, developed by Opera Software, for multiple operating systems. Opera version 7.53 and earlier fails to block write-access to the location object. This flaw is due to a failure to properly validate methods that a user can access. An attacker could use this flaw to steal cookie based authentication credentials, conduct phishing attacks along with other attacks. This could allow a remote attacker to create a specially crafted URL to overwrite methods within the 'location' object that would execute arbitrary code in a victim's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0131.html http://www.osvdb.org/displayvuln.php?osvdb_id=8331 http://www.secunia.com/advisories/12233 http://www.secunia.com/advisories/12235 http://www.greymagic.com/security/advisories/gm008-op/ http://security.gentoo.org/glsa/glsa-200408-05.xml
* Platforms Affected: Opera Software, Opera 7.53 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Opera (7.54 or later), available from the Opera Web site at http://www.opera.com/download/ |
| Related URL |
(CVE) |
| Related URL |
10873 (SecurityFocus) |
| Related URL |
16904 (ISS) |
|