Opera allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Opera to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html | not applicable mailing list |
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html | vendor advisory broken link mailing list exploit |