Vulnerability Name: | CVE-2005-3750 (CCN-23167) | ||||||||
Assigned: | 2005-11-22 | ||||||||
Published: | 2005-11-22 | ||||||||
Updated: | 2022-02-28 | ||||||||
Summary: | Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-74 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: FULLDISC Type: Broken Link, Patch, Vendor Advisory 20051122 Secunia Research: Opera Command Line URL Shell Command Injection Source: MITRE Type: CNA CVE-2005-3750 Source: CCN Type: SA16907 Opera Command Line URL Shell Command Injection Source: SECUNIA Type: Broken Link, Patch 16907 Source: SECUNIA Type: Broken Link 18111 Source: MISC Type: Broken Link, Patch http://secunia.com/secunia_research/2005-57/advisory/ Source: SREASON Type: Third Party Advisory 199 Source: CCN Type: SECTRACK ID: 1015253 Opera URL Loading Script Backtick Parsing Lets Remote Users Execute Arbitrary Shell Commands Source: SECTRACK Type: Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory 1015253 Source: CCN Type: GLSA-200512-10 Opera: Command-line URL shell command injection Source: GENTOO Type: Third Party Advisory GLSA-200512-10 Source: SUSE Type: Third Party Advisory SUSE-SR:2005:028 Source: CCN Type: Opera Web site Opera Web Browser Source: CONFIRM Type: Broken Link http://www.opera.com/docs/changelogs/linux/851/ Source: CCN Type: Opera Download page Download Opera Web Browser Source: OSVDB Type: Broken Link, Patch 21003 Source: CCN Type: OSVDB ID: 21003 Opera Command Line URL Shell Command Injection Source: BUGTRAQ Type: Broken Link, Third Party Advisory, VDB Entry 20051122 Secunia Research: Opera Command Line URL Shell Command Injection Source: BID Type: Broken Link, Patch, Third Party Advisory, VDB Entry 15521 Source: CCN Type: BID-15521 Opera Web Browser Arbitrary Command Execution Vulnerability Source: VUPEN Type: Broken Link ADV-2005-2519 Source: XF Type: UNKNOWN opera-url-backslash-command-execution(23167) Source: SUSE Type: SUSE-SR:2005:028 SUSE Security Summary Report | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |