First published: Tue Nov 24 2009(Updated: )
Opera before 10.10, when exception stacktraces are enabled, places scripting error messages from a web site into variables that can be read by a different web site, which allows remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opera | <=10.10 | |
Opera | =7.0 | |
Opera | =7.23 | |
Opera | =7.53 | |
Opera | =7.54 | |
Opera | =7.60 | |
Opera | =8.0 | |
Opera | =8.01 | |
Opera | =8.02 | |
Opera | =8.50 | |
Opera | =8.51 | |
Opera | =8.52 | |
Opera | =8.53 | |
Opera | =8.54 | |
Opera | =9.0 | |
Opera | =9.01 | |
Opera | =9.02 | |
Opera | =9.10 | |
Opera | =9.12 | |
Opera | =9.20 | |
Opera | =9.21 | |
Opera | =9.22 | |
Opera | =9.51 | |
Opera | =9.52 | |
Opera | =9.64 | |
Opera | =10 | |
Opera | =10.00 | |
Opera | =10.00-beta_3 | |
Opera | =10.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4071 has a moderate severity level due to its potential for cross-site scripting (XSS) and information disclosure.
To fix CVE-2009-4071, update your Opera browser to version 10.10 or newer.
CVE-2009-4071 can allow remote attackers to conduct cross-site scripting (XSS) attacks and obtain sensitive information.
CVE-2009-4071 affects multiple versions of Opera prior to version 10.10, including versions 7.0 through 9.64.
Yes, user interaction with a malicious website can trigger the vulnerabilities in CVE-2009-4071.