Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Opera Web Browser Status Bar Misrepresentation Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Opera Web Browser
by:
5.5
CVSS
MEDIUM
Misrepresentation
CWE
Product Name: Opera Web Browser
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Opera Web Browser Status Bar Misrepresentation Vulnerability

A vulnerability in Opera Web browser allows an attacker to misrepresent the status bar, potentially leading users to follow a link to a malicious site. The vulnerability can be exploited through HTML e-mail or HTML injection attacks in third-party Web applications.

Mitigation:

Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15472/info

A vulnerability has been identified in Opera Web browser that allows an attacker to misrepresent the status bar in the browser, allowing vulnerable users to be mislead into following a link to a malicious site.

This vulnerability would most likely be exploited through HTML e-mail, though other attack vectors exist such as HTML injection attacks in third-party Web applications. 

<form action="[malicious site]">
<a href="www.example.com"><input type="image" src="[image]" title="www.example.com"></a>
</form>