Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/29029 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/27901 | vdb entry |
http://secunia.com/advisories/29152 | third party advisory |
http://security.gentoo.org/glsa/glsa-200803-09.xml | vendor advisory |
http://secunia.com/advisories/29178 | third party advisory |
http://www.opera.com/docs/changelogs/linux/926/ | patch |
http://www.vupen.com/english/advisories/2008/0622 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00010.html | vendor advisory |
http://www.opera.com/support/search/view/880/ |