TITLE: Opera Browser Address Bar Spoofing Vulnerability SECUNIA ADVISORY ID: SA11532 VERIFY ADVISORY: http://secunia.com/advisories/11532/ CRITICAL: Less critical IMPACT: Spoofing WHERE: >From remote SOFTWARE: Opera 7.x DESCRIPTION: Secunia has discovered a vulnerability in the Opera browser, which can be exploited by malicious people to fake (spoof) information displayed in the address bar. The vulnerability is caused due to the Opera browser changing information in the address bar as soon as the browser is "asked" to redirect to a new page. However, using e.g. the tag attribute "onUnload", it is possible to abort the redirection without the address bar being changed back. This can be exploited by a malicious website to trick users into thinking that they're on another website. The vulnerability has been confirmed in version 7.23 for Windows and Linux. Prior versions may also be affected. SOLUTION: Update to version 7.50. http://www.opera.com/download/ PROVIDED AND/OR DISCOVERED BY: Jakob Balle, Secunia Research. ORIGINAL ADVISORY: http://secunia.com/secunia_research/2004-2/advisory/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------