XSS bug in Skype iPhone app allows address book theft
A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says AppSec Consulting security researcher Phil Purviance.
“Skype uses a locally stored HTML file to display chat messages from other Skype users, but it fails to properly encode the incoming users ‘Full Name’, allowing an attacker to craft malicious JavaScript code that runs when the victim views the message,” he explained on his blog.
He then created a PoC attack taking advantage of this XSS flaw.
When a user receives the message in question and opens it, the exploit code runs automatically in the background and makes the victim’s device connect to a server previously set up by the attacker.
From there, the device grabs another payload which orders it to upload the file containing the address book onto the server. All in all, the attack is executed in just a few minutes.
Setting aside for a moment the Skype client’s inability to properly sanitize JavaScript code, the bigger problem demonstrated by this PoC is the fact that – in spite of the existence of the iOS application sandbox which protects most files on the device – the AddressBook file is accessible to every application installed on it.
That means that, in theory, the compromise of any of these apps could yield the information contained in the AddressBook file to attackers.
According to H-Online, the researcher shared the information about the vulnerability with Skype at the end of August but, as confirmed by the company, the fix is still in the works.