Vulnerabilidad en el navegador Opera (CVE-2009-3266)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
18/09/2009
Última modificación:
09/04/2025
Descripción
El navegador Opera anterior a la versión 10.01 no restringe de manera apropiada el HTML en un (1) RSS o (2) Atom feed, que permite a los atacantes remotos realizar ataques de tipo Cross-Site Scripting (XSS), y realizar ataques de tipo cross-zone scripting, que involucran la página Feed Subscription, para leer feeds o crear subscripciones feed, por medio de un feed creado, relacionado con la representación del tipo de contenido application/rss+xml como "scripted content."
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
- http://secunia.com/advisories/37182
- http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/
- http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
- http://www.opera.com/docs/changelogs/mac/1001/
- http://www.opera.com/docs/changelogs/unix/1001/
- http://www.opera.com/docs/changelogs/windows/1001/
- http://www.opera.com/support/kb/view/939/
- http://www.osvdb.org/59358
- http://www.securityfocus.com/archive/1/506517/100/0/threaded
- http://www.securityfocus.com/bid/36418
- http://www.securityfocus.com/bid/36850
- http://www.vupen.com/english/advisories/2009/3073
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314
- http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
- http://secunia.com/advisories/37182
- http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/
- http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
- http://www.opera.com/docs/changelogs/mac/1001/
- http://www.opera.com/docs/changelogs/unix/1001/
- http://www.opera.com/docs/changelogs/windows/1001/
- http://www.opera.com/support/kb/view/939/
- http://www.osvdb.org/59358
- http://www.securityfocus.com/archive/1/506517/100/0/threaded
- http://www.securityfocus.com/bid/36418
- http://www.securityfocus.com/bid/36850
- http://www.vupen.com/english/advisories/2009/3073
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314



