Vulnerability Name:

CVE-2009-3266 (CCN-53606)

Assigned:2009-09-15
Published:2009-09-15
Updated:2018-10-30
Summary:Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content."
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Bypass Security
References:Source: BUGTRAQ
Type: UNKNOWN
20091028 Hijacking Opera's Native Page using malicious RSS payloads

Source: MITRE
Type: CNA
CVE-2009-3266

Source: CCN
Type: SA37182
Opera Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
37182

Source: CCN
Type: SecureThoughts Web Site
Exploiting Chrome and Opera’s inbuilt ATOM/RSS reader with Script Execution and more

Source: MISC
Type: Exploit
http://securethoughts.com/2009/09/exploiting-chrome-and-operas-inbuilt-atomrss-reader-with-script-execution-and-more/

Source: MISC
Type: UNKNOWN
http://securethoughts.com/2009/10/hijacking-operas-native-page-using-malicious-rss-payloads/

Source: CONFIRM
Type: Patch
http://www.opera.com/docs/changelogs/mac/1001/

Source: CONFIRM
Type: Patch
http://www.opera.com/docs/changelogs/unix/1001/

Source: CONFIRM
Type: Patch
http://www.opera.com/docs/changelogs/windows/1001/

Source: CCN
Type: Opera kb939
Advisory: Opera may allow scripts to access feeds

Source: CONFIRM
Type: Vendor Advisory
http://www.opera.com/support/kb/view/939/

Source: OSVDB
Type: UNKNOWN
59358

Source: CCN
Type: OSVDB ID: 59358
Opera Feed Subscription Page Script Execution Feed Manipulation

Source: BUGTRAQ
Type: UNKNOWN
20090916 Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more

Source: BID
Type: UNKNOWN
36418

Source: CCN
Type: BID-36418
Opera Unspecified Security Bypass Vulnerability

Source: BID
Type: UNKNOWN
36850

Source: CCN
Type: BID-36850
Opera Web Browser prior to 10.01 Multiple Security Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2009-3073

Source: XF
Type: UNKNOWN
opera-rss-atom-security-bypass(53606)

Source: XF
Type: UNKNOWN
opera-feed-security-bypass(54021)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:6314

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opera:opera_browser:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:5.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.03:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.04:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.05:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.06:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:6.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.03:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.11:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.20:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.21:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.22:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.23:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.52:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.53:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:7.60:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.52:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.53:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.54:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.02:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.12:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.20:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.21:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.22:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.23:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.24:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.25:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.26:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.27:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.52:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.60:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.61:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.62:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.63:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:9.64:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.00:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.01:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.10:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.50:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.51:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.52:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.53:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:10.53:b:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:opera:opera_browser:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:opera:opera_browser:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20093266
    V
    CVE-2009-3266
    2015-11-16
    oval:org.mitre.oval:def:6314
    V
    Opera 9 and 10 allows remote attackers to conduct XSS Vulnerability
    2014-03-17
    BACK
    opera opera browser 5.0
    opera opera browser 5.0 beta2
    opera opera browser 5.0 beta3
    opera opera browser 5.0 beta4
    opera opera browser 5.0 beta5
    opera opera browser 5.0 beta6
    opera opera browser 5.0 beta7
    opera opera browser 5.0 beta8
    opera opera browser 5.02
    opera opera browser 5.10
    opera opera browser 5.11
    opera opera browser 5.12
    opera opera browser 6.0
    opera opera browser 6.0 beta1
    opera opera browser 6.0 beta2
    opera opera browser 6.0 tp1
    opera opera browser 6.0 tp2
    opera opera browser 6.0 tp3
    opera opera browser 6.01
    opera opera browser 6.1
    opera opera browser 6.1 beta1
    opera opera browser 6.02
    opera opera browser 6.03
    opera opera browser 6.04
    opera opera browser 6.05
    opera opera browser 6.06
    opera opera browser 6.11
    opera opera browser 6.12
    opera opera browser 7.0
    opera opera browser 7.0 beta1
    opera opera browser 7.0 beta1_v2
    opera opera browser 7.0 beta2
    opera opera browser 7.01
    opera opera browser 7.02
    opera opera browser 7.03
    opera opera browser 7.10
    opera opera browser 7.10 beta1
    opera opera browser 7.11
    opera opera browser 7.11 beta2
    opera opera browser 7.20
    opera opera browser 7.20 beta7
    opera opera browser 7.21
    opera opera browser 7.22
    opera opera browser 7.23
    opera opera browser 7.50
    opera opera browser 7.50 beta1
    opera opera browser 7.51
    opera opera browser 7.52
    opera opera browser 7.53
    opera opera browser 7.54
    opera opera browser 7.54 update1
    opera opera browser 7.54 update2
    opera opera browser 7.60
    opera opera browser 8.0
    opera opera browser 8.0 beta1
    opera opera browser 8.0 beta2
    opera opera browser 8.0 beta3
    opera opera browser 8.01
    opera opera browser 8.02
    opera opera browser 8.50
    opera opera browser 8.51
    opera opera browser 8.52
    opera opera browser 8.53
    opera opera browser 8.54
    opera opera browser 9.0
    opera opera browser 9.0 beta1
    opera opera browser 9.0 beta2
    opera opera browser 9.01
    opera opera browser 9.02
    opera opera browser 9.10
    opera opera browser 9.12
    opera opera browser 9.20
    opera opera browser 9.20 beta1
    opera opera browser 9.21
    opera opera browser 9.22
    opera opera browser 9.23
    opera opera browser 9.24
    opera opera browser 9.25
    opera opera browser 9.26
    opera opera browser 9.27
    opera opera browser 9.50
    opera opera browser 9.50 beta1
    opera opera browser 9.50 beta2
    opera opera browser 9.51
    opera opera browser 9.52
    opera opera browser 9.60
    opera opera browser 9.60 beta1
    opera opera browser 9.61
    opera opera browser 9.62
    opera opera browser 9.63
    opera opera browser 9.64
    opera opera browser 10.00
    opera opera browser 10.00 beta1
    opera opera browser 10.00 beta2
    opera opera browser 10.00 beta3
    opera opera browser 10.01
    opera opera browser 10.10
    opera opera browser 10.10 beta1
    opera opera browser 10.50
    opera opera browser 10.50 beta1
    opera opera browser 10.50 beta2
    opera opera browser 10.51
    opera opera browser 10.52
    opera opera browser 10.53
    opera opera browser 10.53 b
    opera opera browser 9.0
    opera opera browser 8.0