Opera < 9.26 Multiple Vulnerabilities

medium Nessus Plugin ID 31129

Synopsis

The remote host contains a web browser that is affected by several issues.

Description

The version of Opera installed on the remote host reportedly is affected by several issues :

- Simulated text input could trick users into uploading arbitrary files.

- Image properties comments containing script will be run when displaying the image properties, leading to code execution in the wrong security context.

- Representation of DOM attribute values could allow cross-site scripting when importing XML into a document.

Solution

Upgrade to Opera version 9.26 or later.

See Also

http://www.opera.com/support/search/view/877/

http://www.opera.com/support/search/view/879/

http://www.opera.com/support/search/view/880/

http://web.archive.org/web/20170910210728/http://www.opera.com:80/docs/changelogs/windows/926/

Plugin Details

Severity: Medium

ID: 31129

File Name: opera_926.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 2/20/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version_UI

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-1080, CVE-2008-1081, CVE-2008-1082

BID: 27901

CWE: 20, 79, 94

Secunia: 29029