0 Members and 1 Guest are viewing this topic.
----------------------------------------------------------------------------- | noptrix.net - Public Security Advisory | ----------------------------------------------------------------------------- Date:-----07/13/2011Vendor:-------Skype Limited - http://www.skype.com/Affected Software:------------------Software: SkypeVersion: <= 5.3.0.120Affected Platforms:-------------------Windows (XP, Vista, 7)Mac OS X <= 10.6.8Vulnerability Class:--------------------Cross-Site ScriptingDescription:------------Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lackof input validation and output sanitization of the "mobile phone" profile entry.Other input fields may also be affected.Proof of Concept:-----------------The following Javascript payload can be used as "mobile phone" entry to triggerthe described vulnerability:--- SNIP ---"><iframe src='' onload=alert('mphone')>--- SNIP ---For a PoC demonstration see: - http://www.noptrix.net/tmp/skype_xss.png - http://www.noptrix.net/tmp/skype_linux.ogv - http://www.noptrix.net/tmp/skype_winxp.ogv - http://www.noptrix.net/tmp/skype_win7.aviImpact:-------An attacker could trivially hijack session IDs of remote users and leverage thevulnerability to increase the attack vector to the underlying software andoperating system of the victim.Threat Level:-------------High!Solution:---------skype.com has to validate the input characters and sanitize the output.Vendor Contact:---------------The vendor will be contacted. 13th or 14th of July 2011.
LOL@Microsoft...One more proof that everything MicroShaft makes - fails.Skype was such a good software, until MS made it SHIT.