{"vuid":"VU#794236","idnumber":"794236","name":"SkypeFind fails to properly sanitize user-supplied input","keywords":["Skype","cross-site scripting","xss","SkypeFind"],"overview":"The Skype client does not properly filter user-supplied input that was received from the SkypeFind service. This vulnerability may allow an attacker to execute arbitrary code.","clean_desc":"Skype is a peer-to-peer application that provides Voice over IP (VoIP) and Instant Messaging services. The Skype client is available for the Microsoft Windows, Apple OS X and Linux operating systems. SkypeFind allows users to review businesses. These reviews are viewable by others. Skype does not properly filter input that was supplied to the SkypeFind full name field. An attacker may be able to exploit this vulnerability by injecting script into the full name field. When a user viewed the specially crafted SkypeFind profile, the script would be run in the Internet Explorer Local Machine Zone.","impact":"As explained in VU#248184, since the user-supplied script runs in the Local Machine Zone a remote unauthenticated attacker may be able to execute arbitrary code.","resolution":"Skype has addressed this issue by filtering input supplied to the SkypeFind service.","workarounds":"Restrict access to the Skype URI Blocking the skype: URI handler by using proxy servers or application firewalls may prevent some remote vulnerabilities in Skype from being exploited without user interaction.","sysaffected":"","thanks":"This vulnerability was made public by Aviv Raff.","author":"This document was written by Ryan Giobbi.","public":["http://aviv.raffon.net/2008/01/31/AttackersCanSkypeFindYou.aspx","http://msdn2.microsoft.com/en-us/library/ms537183.aspx#local","http://www.skype.com/help/guides/skypefind.html","http://www.kb.cert.org/vuls/id/248184"],"cveids":["CVE-2008-0582","CVE-2008-0583"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-02-05T16:02:13Z","publicdate":"2008-01-31T00:00:00Z","datefirstpublished":"2008-02-13T16:03:33Z","dateupdated":"2008-02-13T16:40:28Z","revision":38,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}