URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.
References
Link | Resource |
---|---|
https://security.opera.com/cross-site-scripting-in-ofa-opera-security-advisories/ | Vendor Advisory |
https://security.opera.com/cross-site-scripting-in-ofa-opera-security-advisories/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.opera.com/cross-site-scripting-in-ofa-opera-security-advisories/ - Vendor Advisory |
Information
Published : 2020-12-23 16:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6159
Mitre link : CVE-2020-6159
CVE.ORG link : CVE-2020-6159
JSON object : View
Products Affected
opera
- opera
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')