VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2665
opera_browser: Cross-site scripting (XSS) vulnerability in Opera b...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2665

Original

Cross-site scripting (XSS) vulnerability in Opera before 10.54 on Windows and Mac OS X, and before 10.11 on UNIX platforms, allows remote attackers to inject arbitrary web script or HTML via a data: URI, related to incorrect detection of the "opening site."

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-07-08
Source Information Category:
Advisory, Alert
Last Updated:
2010-07-08




Affected Product Tags
cpe:/a:opera:opera_browser:10.00
cpe:/a:opera:opera_browser:10.00:beta1
cpe:/a:opera:opera_browser:10.00:beta2
cpe:/a:opera:opera_browser:10.00:beta3
cpe:/a:opera:opera_browser:10.01
cpe:/a:opera:opera_browser:10.10
cpe:/a:opera:opera_browser:10.10 and previous versions
cpe:/a:opera:opera_browser:10.10:beta1
cpe:/a:opera:opera_browser:10.50
cpe:/a:opera:opera_browser:10.50:beta1
cpe:/a:opera:opera_browser:10.51
cpe:/a:opera:opera_browser:10.52
cpe:/a:opera:opera_browser:10.52:beta1
cpe:/a:opera:opera_browser:10.52:beta2
cpe:/a:opera:opera_browser:10.53 and previous versions
cpe:/a:opera:opera_browser:5.0
cpe:/a:opera:opera_browser:5.02
cpe:/a:opera:opera_browser:5.0:beta2
cpe:/a:opera:opera_browser:5.0:beta3
cpe:/a:opera:opera_browser:5.0:beta4
cpe:/a:opera:opera_browser:5.0:beta5
cpe:/a:opera:opera_browser:5.0:beta6
cpe:/a:opera:opera_browser:5.0:beta7
cpe:/a:opera:opera_browser:5.0:beta8
cpe:/a:opera:opera_browser:5.10
cpe:/a:opera:opera_browser:5.11
cpe:/a:opera:opera_browser:5.12
cpe:/a:opera:opera_browser:6.0
cpe:/a:opera:opera_browser:6.01
cpe:/a:opera:opera_browser:6.02
cpe:/a:opera:opera_browser:6.03
cpe:/a:opera:opera_browser:6.04
cpe:/a:opera:opera_browser:6.05
cpe:/a:opera:opera_browser:6.06
cpe:/a:opera:opera_browser:6.0:beta1
cpe:/a:opera:opera_browser:6.0:beta2
cpe:/a:opera:opera_browser:6.0:beta3
cpe:/a:opera:opera_browser:6.0:tp1
cpe:/a:opera:opera_browser:6.0:tp2
cpe:/a:opera:opera_browser:6.0:tp3
cpe:/a:opera:opera_browser:6.1
cpe:/a:opera:opera_browser:6.11
cpe:/a:opera:opera_browser:6.12
cpe:/a:opera:opera_browser:6.1:beta1
cpe:/a:opera:opera_browser:7.0
cpe:/a:opera:opera_browser:7.01
cpe:/a:opera:opera_browser:7.02
cpe:/a:opera:opera_browser:7.03
cpe:/a:opera:opera_browser:7.0:beta1
cpe:/a:opera:opera_browser:7.0:beta1_v2
cpe:/a:opera:opera_browser:7.0:beta2
cpe:/a:opera:opera_browser:7.10
cpe:/a:opera:opera_browser:7.10:beta1
cpe:/a:opera:opera_browser:7.11
cpe:/a:opera:opera_browser:7.11:beta2
cpe:/a:opera:opera_browser:7.20
cpe:/a:opera:opera_browser:7.20:beta7
cpe:/a:opera:opera_browser:7.21
cpe:/a:opera:opera_browser:7.22
cpe:/a:opera:opera_browser:7.23
cpe:/a:opera:opera_browser:7.50
cpe:/a:opera:opera_browser:7.50:beta1
cpe:/a:opera:opera_browser:7.51
cpe:/a:opera:opera_browser:7.52
cpe:/a:opera:opera_browser:7.53
cpe:/a:opera:opera_browser:7.54
cpe:/a:opera:opera_browser:7.54:update1
cpe:/a:opera:opera_browser:7.54:update2
cpe:/a:opera:opera_browser:7.60
cpe:/a:opera:opera_browser:8.0
cpe:/a:opera:opera_browser:8.00
cpe:/a:opera:opera_browser:8.01
cpe:/a:opera:opera_browser:8.02
cpe:/a:opera:opera_browser:8.0:beta1
cpe:/a:opera:opera_browser:8.0:beta2
cpe:/a:opera:opera_browser:8.0:beta3
cpe:/a:opera:opera_browser:8.50
cpe:/a:opera:opera_browser:8.51
cpe:/a:opera:opera_browser:8.52
cpe:/a:opera:opera_browser:8.53
cpe:/a:opera:opera_browser:8.54
cpe:/a:opera:opera_browser:9.0
cpe:/a:opera:opera_browser:9.00
cpe:/a:opera:opera_browser:9.01
cpe:/a:opera:opera_browser:9.02
cpe:/a:opera:opera_browser:9.0:beta1
cpe:/a:opera:opera_browser:9.0:beta2
cpe:/a:opera:opera_browser:9.10
cpe:/a:opera:opera_browser:9.12
cpe:/a:opera:opera_browser:9.20
cpe:/a:opera:opera_browser:9.20:beta1
cpe:/a:opera:opera_browser:9.21
cpe:/a:opera:opera_browser:9.22
cpe:/a:opera:opera_browser:9.23
cpe:/a:opera:opera_browser:9.24
cpe:/a:opera:opera_browser:9.25
cpe:/a:opera:opera_browser:9.26
cpe:/a:opera:opera_browser:9.27
cpe:/a:opera:opera_browser:9.50
cpe:/a:opera:opera_browser:9.50:beta1
cpe:/a:opera:opera_browser:9.50:beta2
cpe:/a:opera:opera_browser:9.51
cpe:/a:opera:opera_browser:9.52
cpe:/a:opera:opera_browser:9.60
cpe:/a:opera:opera_browser:9.60:beta1
cpe:/a:opera:opera_browser:9.61
cpe:/a:opera:opera_browser:9.62
cpe:/a:opera:opera_browser:9.63
cpe:/a:opera:opera_browser:9.64
cpe:/o:apple:mac_os_x
cpe:/o:microsoft:windows
cpe:/o:unix:unix
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
BID 40973




CONFIRM http://www.opera.com/support/kb/view/955/




CONFIRM http://www.opera.com/docs/changelogs/windows/1054/




CONFIRM http://www.opera.com/docs/changelogs/unix/1011/




CONFIRM http://www.opera.com/docs/changelogs/mac/1054/




SECUNIA 40250




VUPEN ADV-2010-1529




Vulnerability Type Cross-Site Scripting (XSS) (CWE-79)





Copyright © 2010 JPCERT/CC All Rights Reserved.