The links panel in Opera before 9.62 processes Javascript within the context of the "outermost page" of a frame, which allows remote attackers to inject arbitrary web script or HTML via cross-site scripting (XSS) attacks.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/32538 | third party advisory |
http://www.securitytracker.com/id?1021127 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html | vendor advisory |
http://www.opera.com/support/search/view/907/ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46220 | vdb entry |
http://www.securityfocus.com/bid/31991 | exploit vdb entry patch |
http://security.gentoo.org/glsa/glsa-200811-01.xml | vendor advisory |