Setting aside for a moment the Skype client’s inability to properly sanitize JavaScript code, the bigger problem demonstrated by this PoC is the fact that – in spite of the existence of the iOS application sandbox which protects most files on the device – the AddressBook file is accessible to every application installed on it. All in all, the attack is executed in just a few minutes. When a user receives the message in question and opens it, the exploit code runs automatically in the background and makes the victim’s device connect to a server previously set up by the attacker.įrom there, the device grabs another payload which orders it to upload the file containing the address book onto the server. He then created a PoC attack taking advantage of this XSS flaw. “Skype uses a locally stored HTML file to display chat messages from other Skype users, but it fails to properly encode the incoming users ‘Full Name’, allowing an attacker to craft malicious JavaScript code that runs when the victim views the message,” he explained on his blog. A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says AppSec Consulting security researcher Phil Purviance.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |