Opera < 7.23 File Download Encoded Traversal Arbitrary File Deletion

Medium Nessus Plugin ID 14246


Files could be overwritten on the remote host.


The version of Opera installed on the remote host contains a file corruption vulnerability. This issue is exposed when a user is presented with a file dialog, which will cause the creation of a temporary file. It is possible to specify a relative path to another file on the system using directory traversal sequences when the download dialog is displayed. If the client user has write permissions to the attacker-specified file, it will be corrupted.

This could be exploited to delete sensitive files on the systems.


Install Opera 7.23 or newer.

Plugin Details

Severity: Medium

ID: 14246

File Name: opera_file_corruption.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2004/08/10

Modified: 2011/11/28

Dependencies: 21746

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:opera:opera_browser

Required KB Items: SMB/Opera/Version

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2003/12/13

Reference Information

BID: 9279

OSVDB: 3017