Opera < 7.23 File Download Encoded Traversal Arbitrary File Deletion

This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.


Synopsis :

Files could be overwritten on the remote host.

Description :

The version of Opera installed on the remote host contains a file
corruption vulnerability. This issue is exposed when a user is
presented with a file dialog, which will cause the creation of a
temporary file. It is possible to specify a relative path to another
file on the system using directory traversal sequences when the
download dialog is displayed. If the client user has write
permissions to the attacker-specified file, it will be corrupted.

This could be exploited to delete sensitive files on the systems.

Solution :

Install Opera 7.23 or newer.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 14246 ()

Bugtraq ID: 9279

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now