Skype confirms XSS vulnerability in iPhone app
The problem is made more exploitable by the way Skype uses the embeddable WebKit browser; Skype developers have set the URI scheme for the embedded browser to "file://". This error allows an attacker to access the file system and read any file that the app would be allowed to read by the iOS application sandbox. One file that every iOS application has access to is the user's SQLlite AddressBook database. In a demonstration of the bugs, Phil Purviance, AppSec Consulting security researcher, showed how it was possible to extract the iPhone address book using the vulnerabilities.
Purviance says he informed Skype of the issue on 24 August and was told that an update to fix it would be released early in September. Skype has now confirmed there is an issue and told media sources "we are working hard to fix this reported issue in our next planned release which we hope to roll out imminently".
- Vulnerability in Skype allows accounts to be hijacked, a report from The H.