Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, or to conduct spoofing attacks.
1) An error in the handling of data URIs can potentially be exploited to execute arbitrary script code on sites, which did not directly cause the data URI to be opened.
This vulnerabilities is reported in Opera versions prior to 10.54 on Windows and Mac, and Opera version prior to 10.11 on Linux and FreeBSD.
2) An error in the handling of widgets can be exploited by a malicious widget to create, read, modify, or delete files on the local system.
Successful exploitation requires that a malicious widget is installed with granted File I/O permissions.
This vulnerability affects Opera for Windows and Mac.
3) An error in the handling of Internationalized Domain Names (IDN) can be exploited to spoof a trusted URL.
4) A weakness is caused due to an error in the handling of file upload forms, which can be exploited to disclose path information of selected files.
Solution: Update to version 10.54 for Windows and Mac or version 10.60 for Linux and FreeBSD.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Opera Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.