Opera < 7.23 File Download Encoded Traversal Arbitrary File Deletion

This script is Copyright (C) 2004-2011 Tenable Network Security, Inc.

Synopsis :

Files could be overwritten on the remote host.

Description :

The version of Opera installed on the remote host contains a file
corruption vulnerability. This issue is exposed when a user is
presented with a file dialog, which will cause the creation of a
temporary file. It is possible to specify a relative path to another
file on the system using directory traversal sequences when the
download dialog is displayed. If the client user has write
permissions to the attacker-specified file, it will be corrupted.

This could be exploited to delete sensitive files on the systems.

Solution :

Install Opera 7.23 or newer.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 14246 ()

Bugtraq ID: 9279


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now