ID CVE-2008-2716
Summary Unspecified vulnerability in Opera before 9.5 allows remote attackers to spoof the contents of trusted frames on the same parent page by modifying the location, which can facilitate phishing attacks.
References
Vulnerable Configurations
  • cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.10:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.30:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.30:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.55:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.55:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.00:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.00:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*
  • cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
    cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 01-03-2022 - 15:05)
Impact:
Exploitability:
CWE CWE-1021
CAPEC
  • iFrame Overlay
    In an iFrame overlay attack the victim is tricked into unknowingly initiating some action in one system while interacting with the UI from seemingly completely different system. While being logged in to some target system, the victim visits the attackers' malicious site which displays a UI that the victim wishes to interact with. In reality, the iFrame overlay page has a transparent layer above the visible UI with action controls that the attacker wishes the victim to execute. The victim clicks on buttons or other UI elements they see on the page which actually triggers the action controls in the transparent overlaying layer. Depending on what that action control is, the attacker may have just tricked the victim into executing some potentially privileged (and most undesired) functionality in the target system to which the victim is authenticated. The basic problem here is that there is a dichotomy between what the victim thinks he or she is clicking on versus what he or she is actually clicking on.
  • Task Impersonation
    An adversary, through a previously installed malicious application, monitors the task list maintained by the operating system and waits for a specific legitimate task to become active. Once the task is detected, the malicious application launches a new task in the foreground that mimics the user interface of the legitimate task. At this point, the user thinks that they are interacting with the legitimate task that they started, but instead they are interacting with the malicious application. This type of attack is most often used to obtain sensitive information (e.g., credentials) from the user. Once the adversary's goal is reached, the malicious application can exit, leaving the original trusted application visible and the appearance that nothing out of the ordinary has occurred.
  • Flash File Overlay
    An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user actions, such as clicks, are caught by the Flash application rather than the underlying HTML. The action is then interpreted by the overlay to perform the actions the attacker wishes.
  • Tapjacking
    An adversary, through a previously installed malicious application, displays an interface that misleads the user and convinces him/her to tap on an attacker desired location on the screen. This is often accomplished by overlaying one screen on top of another while giving the appearance of a single interface. There are two main techniques used to accomplish this. The first is to leverage transparent properties that allow taps on the screen to pass through the visible application to an application running in the background. The second is to strategically place a small object (e.g., a button or text field) on top of the visible screen and make it appear to be a part of the underlying application. In both cases, the user is convinced to tap on the screen but does not realize the application that they are interacting with.
  • Clickjacking
    In a clickjacking attack the victim is tricked into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different system. While being logged in to some target system, the victim visits the adversary's malicious site which displays a UI that the victim wishes to interact with. In reality, the clickjacked page has a transparent layer above the visible UI with action controls that the adversary wishes the victim to execute. The victim clicks on buttons or other UI elements they see on the page which actually triggers the action controls in the transparent overlaying layer. Depending on what that action control is, the adversary may have just tricked the victim into executing some potentially privileged (and most certainly undesired) functionality in the target system to which the victim is authenticated. The basic problem here is that there is a dichotomy between what the victim thinks they are clicking on versus what they are actually clicking on.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 29684
confirm
sectrack 1020292
secunia
  • 30636
  • 30682
suse SUSE-SA:2008:029
vupen ADV-2008-1812
xf opera-parentpageframe-weak-security(43033)
Last major update 01-03-2022 - 15:05
Published 16-06-2008 - 22:41
Last modified 01-03-2022 - 15:05
Back to Top