CVE-2009-3266
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
18/09/2009
Last modified:
09/04/2025
Description
Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
- http://secunia.com/advisories/37182
- http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/
- http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
- http://www.opera.com/docs/changelogs/mac/1001/
- http://www.opera.com/docs/changelogs/unix/1001/
- http://www.opera.com/docs/changelogs/windows/1001/
- http://www.opera.com/support/kb/view/939/
- http://www.osvdb.org/59358
- http://www.securityfocus.com/archive/1/506517/100/0/threaded
- http://www.securityfocus.com/bid/36418
- http://www.securityfocus.com/bid/36850
- http://www.vupen.com/english/advisories/2009/3073
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314
- http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
- http://secunia.com/advisories/37182
- http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/
- http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
- http://www.opera.com/docs/changelogs/mac/1001/
- http://www.opera.com/docs/changelogs/unix/1001/
- http://www.opera.com/docs/changelogs/windows/1001/
- http://www.opera.com/support/kb/view/939/
- http://www.osvdb.org/59358
- http://www.securityfocus.com/archive/1/506517/100/0/threaded
- http://www.securityfocus.com/bid/36418
- http://www.securityfocus.com/bid/36850
- http://www.vupen.com/english/advisories/2009/3073
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314



