Lucene search

K
certCERTVU:612949
HistoryJun 28, 2005 - 12:00 a.m.

XMLHttpRequest Object security bypass in Opera Web Browser

2005-06-2800:00:00
www.kb.cert.org
23

0.006 Low

EPSS

Percentile

78.6%

Overview

The Opera Web Browser fails to properly enforce security restrictions on the XMLHttpRequest Object. This may allow a remote, unauthenticated attacker to insert content from potentially malicious web sites.

Description

The XMLHttpRequest Object is a scripting object that provides routines to make HTTP requests without needing to reload a webpage. This functionality can be used to include information from other pages. For security reasons, this functionality is restricted to only allow request to be made within the same domain. However, the Opera Web Browser fails to enforce this restriction and allows the XMLHttpRequest Object to access resources from other domains.


Impact

A remote, unauthenticated attacker may be able to access content and perform actions on web sites from a different domain. Attackers can leverage this vulnerability to launch social engineering attacks, such as phishing, in order to trick users into divulging personal information including, but not limited to, financial and medical data.


Solution

Upgrade

This issue was corrected in Opera 8.01.


Disable****Scripting and Java

At a minimum, disable scripting, such as JavaScript and Java within the Opera web browser.


Vendor Information

612949

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Opera Software __ Affected

Updated: June 24, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the changelog for Opera 8.1 for information regarding security fixes in Opera.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23612949 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in a Secunia Research Advisory. The advisory credits Jakob Balle, Secunia Research with discoivering this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-1475
Severity Metric: 5.79 Date Public:

0.006 Low

EPSS

Percentile

78.6%