Opera 11.61 URL Spoof Vuln

2012-06-15 / 2012-08-15
Risk: Low
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

CVE ID: Opera did not assign ,please cve@mitre.org assign CAL ID: CAL-2012-0015 ref: http://blog.vulnhunt.com/index.php/2012/06/14/cal-2012-0015-opera-website-spoof/ 1 Affected Products ================= 11.61 and prior 2 Vulnerability Details ===================== Code Audit Labs http://www.vulnhunt.com has discovered a website spoof vulnerability in Opera .When a user types a new URL for the browser to load, the currently active page may detect when the new page is about to load and prevent the navigation, while still leaving the new URL displayed in the address bar. This can then be used to spoof the URL of the target page. The malicious page would need to employ social engineering tactics in order to guess what page the user is likely to try to load next, as it cannot see what URL the user has typed. 3: how to fixed ========== Opera Software has released Opera 12 and Opera 11.65, where this issue has been fixed. http://www.opera.com/support/kb/view/1022/ 4 About Code Audit Labs: ===================== Code Audit Labs secure your software,provide Professional include source code audit and binary code audit service. Code Audit Labs:¡± You create value for customer,We protect your value¡± http://www.VulnHunt.com http://blog.Vulnhunt.com http://t.qq.com/vulnhunt http://weibo.com/vulnhunt https://twitter.com/vulnhunt

References:

http://blog.vulnhunt.com/index.php/2012/06/14/cal-2012-0015-opera-website-spoof/
http://www.VulnHunt.com
http://blog.Vulnhunt.com
http://t.qq.com/vulnhunt
http://weibo.com/vulnhunt
https://twitter.com/vulnhunt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top