First published: Wed Dec 23 2020(Updated: )
URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.
Credit: security@opera.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opera Opera | <61.0.3076.56532 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6159 refers to a vulnerability where the protocol of URLs using 'javascript:' is not removed when pasted into the address bar, potentially exposing users to cross-site scripting (XSS) attacks.
The severity of CVE-2020-6159 is medium with a CVSS score of 6.1.
CVE-2020-6159 affects Opera on Android versions up to exclusive version 61.0.3076.56532.
The CVE-2020-6159 vulnerability can be exploited by tricking users into running a cross-site scripting (XSS) attack on themselves through social engineering techniques.
It is recommended to update Opera on Android to a version above 61.0.3076.56532 to fix the CVE-2020-6159 vulnerability.