CVE-2007-1563
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
21/03/2007
Last modified:
09/04/2025
Description
The FTP protocol implementation in Opera 9.10 allows remote attackers to allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf
- http://secunia.com/advisories/25027
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.securityfocus.com/bid/23089
- http://www.securitytracker.com/id?1017802=
- http://www.vupen.com/english/advisories/2007/1075
- http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf
- http://secunia.com/advisories/25027
- http://www.novell.com/linux/security/advisories/2007_28_opera.html
- http://www.securityfocus.com/bid/23089
- http://www.securitytracker.com/id?1017802=
- http://www.vupen.com/english/advisories/2007/1075



