CVE-2009-3266

Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
http://secunia.com/advisories/37182 Vendor Advisory
http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ Exploit
http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
http://www.opera.com/docs/changelogs/mac/1001/ Patch
http://www.opera.com/docs/changelogs/unix/1001/ Patch
http://www.opera.com/docs/changelogs/windows/1001/ Patch
http://www.opera.com/support/kb/view/939/ Vendor Advisory
http://www.osvdb.org/59358
http://www.securityfocus.com/archive/1/506517/100/0/threaded
http://www.securityfocus.com/bid/36418
http://www.securityfocus.com/bid/36850
http://www.vupen.com/english/advisories/2009/3073 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314
http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
http://secunia.com/advisories/37182 Vendor Advisory
http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ Exploit
http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
http://www.opera.com/docs/changelogs/mac/1001/ Patch
http://www.opera.com/docs/changelogs/unix/1001/ Patch
http://www.opera.com/docs/changelogs/windows/1001/ Patch
http://www.opera.com/support/kb/view/939/ Vendor Advisory
http://www.osvdb.org/59358
http://www.securityfocus.com/archive/1/506517/100/0/threaded
http://www.securityfocus.com/bid/36418
http://www.securityfocus.com/bid/36850
http://www.vupen.com/english/advisories/2009/3073 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html - () http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html -
References () http://secunia.com/advisories/37182 - Vendor Advisory () http://secunia.com/advisories/37182 - Vendor Advisory
References () http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ - Exploit () http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ - Exploit
References () http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/ - () http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/ -
References () http://www.opera.com/docs/changelogs/mac/1001/ - Patch () http://www.opera.com/docs/changelogs/mac/1001/ - Patch
References () http://www.opera.com/docs/changelogs/unix/1001/ - Patch () http://www.opera.com/docs/changelogs/unix/1001/ - Patch
References () http://www.opera.com/docs/changelogs/windows/1001/ - Patch () http://www.opera.com/docs/changelogs/windows/1001/ - Patch
References () http://www.opera.com/support/kb/view/939/ - Vendor Advisory () http://www.opera.com/support/kb/view/939/ - Vendor Advisory
References () http://www.osvdb.org/59358 - () http://www.osvdb.org/59358 -
References () http://www.securityfocus.com/archive/1/506517/100/0/threaded - () http://www.securityfocus.com/archive/1/506517/100/0/threaded -
References () http://www.securityfocus.com/bid/36418 - () http://www.securityfocus.com/bid/36418 -
References () http://www.securityfocus.com/bid/36850 - () http://www.securityfocus.com/bid/36850 -
References () http://www.vupen.com/english/advisories/2009/3073 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3073 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54021 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54021 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314 -

Information

Published : 2009-09-18 22:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3266

Mitre link : CVE-2009-3266

CVE.ORG link : CVE-2009-3266


JSON object : View

Products Affected

opera

  • opera_browser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')