FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

opera -- multiple vulnerabilities

Affected packages
linux-opera < 9.61
opera < 9.61

Details

VuXML ID f5c4d7f7-9f4b-11dd-bab1-001999392805
Discovery 2008-10-17
Entry 2008-10-28
Modified 2010-05-02

Opera reports:

Certain constructs are not escaped correctly by Opera's History Search results. These can be used to inject scripts into the page, which can then be used to look through the user's browsing history, including the contents of the pages they have visited. These may contain sensitive information.

If a link that uses a JavaScript URL triggers Opera's Fast Forward feature, when the user activates Fast Forward, the script should run on the current page. When a page is held in a frame, the script is incorrectly executed on the outermost page, not the page where the URL was located. This can be used to execute scripts in the context of an unrelated frame, which allows cross-site scripting.

When Opera is previewing a news feed, some scripts are not correctly blocked. These scripts are able to subscribe the user to any feed URL that the attacker chooses, and can also view the contents of any feeds that the user is subscribed to. These may contain sensitive information.

References

CVE Name CVE-2008-4697
CVE Name CVE-2008-4698
CVE Name CVE-2008-4725
URL http://www.opera.com/support/search/view/903/
URL http://www.opera.com/support/search/view/904/
URL http://www.opera.com/support/search/view/905/