CVE-2008-4697

The Fast Forward feature in Opera before 9.61, when a page is located in a frame, executes a javascript: URL in the context of the outermost page instead of the page that contains this URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html
http://secunia.com/advisories/32299 Vendor Advisory
http://secunia.com/advisories/32394 Vendor Advisory
http://secunia.com/advisories/32538 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200811-01.xml
http://www.openwall.com/lists/oss-security/2008/10/21/6
http://www.openwall.com/lists/oss-security/2008/10/22/5
http://www.opera.com/docs/changelogs/freebsd/961/
http://www.opera.com/docs/changelogs/linux/961/
http://www.opera.com/docs/changelogs/mac/961/
http://www.opera.com/docs/changelogs/solaris/961/
http://www.opera.com/docs/changelogs/windows/961/
http://www.opera.com/support/search/view/904/ Vendor Advisory
http://www.securityfocus.com/bid/31842
http://www.vupen.com/english/advisories/2008/2873
https://exchange.xforce.ibmcloud.com/vulnerabilities/46004
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html
http://secunia.com/advisories/32299 Vendor Advisory
http://secunia.com/advisories/32394 Vendor Advisory
http://secunia.com/advisories/32538 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200811-01.xml
http://www.openwall.com/lists/oss-security/2008/10/21/6
http://www.openwall.com/lists/oss-security/2008/10/22/5
http://www.opera.com/docs/changelogs/freebsd/961/
http://www.opera.com/docs/changelogs/linux/961/
http://www.opera.com/docs/changelogs/mac/961/
http://www.opera.com/docs/changelogs/solaris/961/
http://www.opera.com/docs/changelogs/windows/961/
http://www.opera.com/support/search/view/904/ Vendor Advisory
http://www.securityfocus.com/bid/31842
http://www.vupen.com/english/advisories/2008/2873
https://exchange.xforce.ibmcloud.com/vulnerabilities/46004
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*

History

21 Nov 2024, 00:52

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html -
References () http://secunia.com/advisories/32299 - Vendor Advisory () http://secunia.com/advisories/32299 - Vendor Advisory
References () http://secunia.com/advisories/32394 - Vendor Advisory () http://secunia.com/advisories/32394 - Vendor Advisory
References () http://secunia.com/advisories/32538 - Vendor Advisory () http://secunia.com/advisories/32538 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200811-01.xml - () http://security.gentoo.org/glsa/glsa-200811-01.xml -
References () http://www.openwall.com/lists/oss-security/2008/10/21/6 - () http://www.openwall.com/lists/oss-security/2008/10/21/6 -
References () http://www.openwall.com/lists/oss-security/2008/10/22/5 - () http://www.openwall.com/lists/oss-security/2008/10/22/5 -
References () http://www.opera.com/docs/changelogs/freebsd/961/ - () http://www.opera.com/docs/changelogs/freebsd/961/ -
References () http://www.opera.com/docs/changelogs/linux/961/ - () http://www.opera.com/docs/changelogs/linux/961/ -
References () http://www.opera.com/docs/changelogs/mac/961/ - () http://www.opera.com/docs/changelogs/mac/961/ -
References () http://www.opera.com/docs/changelogs/solaris/961/ - () http://www.opera.com/docs/changelogs/solaris/961/ -
References () http://www.opera.com/docs/changelogs/windows/961/ - () http://www.opera.com/docs/changelogs/windows/961/ -
References () http://www.opera.com/support/search/view/904/ - Vendor Advisory () http://www.opera.com/support/search/view/904/ - Vendor Advisory
References () http://www.securityfocus.com/bid/31842 - () http://www.securityfocus.com/bid/31842 -
References () http://www.vupen.com/english/advisories/2008/2873 - () http://www.vupen.com/english/advisories/2008/2873 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46004 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46004 -

Information

Published : 2008-10-23 22:00

Updated : 2024-11-21 00:52


NVD link : CVE-2008-4697

Mitre link : CVE-2008-4697

CVE.ORG link : CVE-2008-4697


JSON object : View

Products Affected

opera

  • opera_browser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')