Vulnerability Name:

CVE-2005-3750 (CCN-23167)

Assigned:2005-11-22
Published:2005-11-22
Updated:2022-02-28
Summary:Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-74
Vulnerability Consequences:Gain Access
References:Source: FULLDISC
Type: Broken Link, Patch, Vendor Advisory
20051122 Secunia Research: Opera Command Line URL Shell Command Injection

Source: MITRE
Type: CNA
CVE-2005-3750

Source: CCN
Type: SA16907
Opera Command Line URL Shell Command Injection

Source: SECUNIA
Type: Broken Link, Patch
16907

Source: SECUNIA
Type: Broken Link
18111

Source: MISC
Type: Broken Link, Patch
http://secunia.com/secunia_research/2005-57/advisory/

Source: SREASON
Type: Third Party Advisory
199

Source: CCN
Type: SECTRACK ID: 1015253
Opera URL Loading Script Backtick Parsing Lets Remote Users Execute Arbitrary Shell Commands

Source: SECTRACK
Type: Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
1015253

Source: CCN
Type: GLSA-200512-10
Opera: Command-line URL shell command injection

Source: GENTOO
Type: Third Party Advisory
GLSA-200512-10

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2005:028

Source: CCN
Type: Opera Web site
Opera Web Browser

Source: CONFIRM
Type: Broken Link
http://www.opera.com/docs/changelogs/linux/851/

Source: CCN
Type: Opera Download page
Download Opera Web Browser

Source: OSVDB
Type: Broken Link, Patch
21003

Source: CCN
Type: OSVDB ID: 21003
Opera Command Line URL Shell Command Injection

Source: BUGTRAQ
Type: Broken Link, Third Party Advisory, VDB Entry
20051122 Secunia Research: Opera Command Line URL Shell Command Injection

Source: BID
Type: Broken Link, Patch, Third Party Advisory, VDB Entry
15521

Source: CCN
Type: BID-15521
Opera Web Browser Arbitrary Command Execution Vulnerability

Source: VUPEN
Type: Broken Link
ADV-2005-2519

Source: XF
Type: UNKNOWN
opera-url-backslash-command-execution(23167)

Source: SUSE
Type: SUSE-SR:2005:028
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opera:opera_browser:*:*:*:*:*:*:*:* (Version < 8.51)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20053750
    V
    CVE-2005-3750
    2015-11-16
    BACK
    opera opera browser *