Vulnerability Name:

CVE-2004-2083 (CCN-21698)

Assigned:2004-02-11
Published:2004-02-11
Updated:2022-02-28
Summary:Opera Web Browser 7.0 through 7.23 allows remote attackers to trick users into executing a malicious file by embedding a CLSID in the file name, which causes the malicious file to appear as a trusted file type, aka "File Download Extension Spoofing."
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2004-2083

Source: CCN
Type: SA10760
Opera Browser File Download Extension Spoofing

Source: SECUNIA
Type: Broken Link, Vendor Advisory
10760

Source: MISC
Type: Broken Link, Vendor Advisory
http://secunia.com/Internet_Explorer_File_Download_Extension_Spoofing_Test/

Source: CCN
Type: Opera Web site
Opera Web Browser

Source: CONFIRM
Type: Broken Link
http://www.opera.com/docs/changelogs/windows/750b1/

Source: CCN
Type: Opera Download page
Download Opera Web Browser

Source: OSVDB
Type: Broken Link
3917

Source: CCN
Type: OSVDB ID: 3917
Opera Browser File Download Extension Spoofing

Source: BID
Type: Broken Link, Exploit, Third Party Advisory, VDB Entry
9640

Source: CCN
Type: BID-9640
Opera Web Browser CLSID File Extension Misrepresentation Vulnerability

Source: XF
Type: Third Party Advisory, VDB Entry
opera-cslid-extension-spoof(21698)

Source: XF
Type: UNKNOWN
opera-cslid-extension-spoof(21698)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opera:opera_browser:*:*:*:*:*:*:*:* (Version >= 7.0 and <= 7.23)

  • * Denotes that component is vulnerable
    BACK
    opera opera browser *