Vulnerability Details : CVE-2009-3266
Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2009-3266
- cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*
- cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-3266
0.81%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3266
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2009-3266
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3266
-
http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
-
http://www.opera.com/support/kb/view/939/
Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6314
-
http://archives.neohapsis.com/archives/bugtraq/2009-10/0289.html
-
http://www.opera.com/docs/changelogs/mac/1001/
Patch
-
http://www.securityfocus.com/bid/36850
-
http://www.opera.com/docs/changelogs/unix/1001/
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/54021
-
http://www.opera.com/docs/changelogs/windows/1001/
Patch
-
http://www.vupen.com/english/advisories/2009/3073
Vendor Advisory
-
http://www.securityfocus.com/archive/1/506517/100/0/threaded
-
http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/
Exploit
-
http://www.securityfocus.com/bid/36418
Jump to