Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 96683

Summary: www-client/opera Dialog Origin Spoofing Vulnerability
Product: Gentoo Security Reporter: Sune Kloppenborg Jeppesen (RETIRED) <jaervosz>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Other   
URL: http://secunia.com/advisories/15488/
Whiteboard:
Package list:
Runtime testing required: ---

Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-06-21 03:46:06 UTC
Secunia Research has discovered a vulnerability in Opera, which can be exploited by malicious web sites to spoof dialog boxes.
 
 The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g. a prompt dialog box, which appears to be from a trusted site.
 
 Successful exploitation normally requires that a user is tricked into opening a link from a malicious web site to a trusted web site.
 
 Secunia has constructed a test, which can be used to check if your browser is affected by this issue:
 http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
 
 The vulnerability has been confirmed in version 8.0. Prior versions may also be affected.

Solution:
Update to version 8.01.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-06-21 13:30:45 UTC
Added to the 8.01 fixlist

*** This bug has been marked as a duplicate of 96273 ***