Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html - | |
References | () http://secunia.com/advisories/37182 - Vendor Advisory | |
References | () http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/ - Exploit | |
References | () http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/ - | |
References | () http://www.opera.com/docs/changelogs/mac/1001/ - Patch | |
References | () http://www.opera.com/docs/changelogs/unix/1001/ - Patch | |
References | () http://www.opera.com/docs/changelogs/windows/1001/ - Patch | |
References | () http://www.opera.com/support/kb/view/939/ - Vendor Advisory | |
References | () http://www.osvdb.org/59358 - | |
References | () http://www.securityfocus.com/archive/1/506517/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/36418 - | |
References | () http://www.securityfocus.com/bid/36850 - | |
References | () http://www.vupen.com/english/advisories/2009/3073 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54021 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314 - |
Information
Published : 2009-09-18 22:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-3266
Mitre link : CVE-2009-3266
CVE.ORG link : CVE-2009-3266
JSON object : View
Products Affected
opera
- opera_browser
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')