Document Title: =============== Skype v8.x - History Export v7 Web Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2187 Vulnerability Magazine: https://www.vulnerability-db.com/?q=articles/2019/08/11/skype MSRC: VULN-007910 Release Date: ============= 2019-11-22 Vulnerability Laboratory ID (VL-ID): ==================================== 2187 Common Vulnerability Scoring System: ==================================== 4.3 Vulnerability Class: ==================== Script Code Injection Current Estimated Price: ======================== 1.000€ - 2.000€ Product & Service Introduction: =============================== Skype is a telecommunications application that specializes in providing video chat and voice calls between computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet. Skype also provides instant messaging services. Users may transmit text, video, audio and images. Skype allows video conference calls. At the end of 2010, there were over 660 million worldwide users, with over 300 million estimated active each month as of August 2015. At one point in February 2012, there were 34 million users concurrently online on Skype. (Copy of the Homepage: https://en.wikipedia.org/wiki/Skype ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a persistent vulnerability in skype v8.49.0.49 and older versions. Vulnerability Disclosure Timeline: ================================== 2019-11-22: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Restricted Authentication (Guest Privileges) User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ A persistent script code injection vulnerability has been discovered in the skype v8.49.0.49 software. Skype has a new export function for the skype v7.x contents and messages. Users are able to export the old logs to generate a html file inside the browser with the exported content of the main.db file in combination with the journal file. The content is rendered and generated in the local installed standard browser without much usage of physical capacity. In an earlier version of skype a researchers regular skype name was formated as script code payload with iframe. The payload was saved inside of my old v7.x profile. After the researcher noticed the newst version allows to export the old logs, he used his profile with the payload in the username to open the export via main.db file. From the main db file a html file is generated that uses the name and the username of the v7.x entries to display (old conversations). This name output is displayed without safe encode / parse mechanism for special chars. In the moment the payload becomes visible the execution takes place though the newst skype version v8.x Skype itself dumps the conversation content from separate html files generated in the skype-export path of the system user account. Thus could lead as well to the manipulation of the local files that are not checking the validity or authority of the contents when transmitting. Also there is not check that those files are not manipulated at all including executable java-script code and html elements. Normally a check ensures that the generated files of the export function does not contain malformed executable codes. The generated files itself should be checked on side of the software to approve for specific manipulation attempts locally. Finally the issue allows a remote attacker to send with skype v7.x messages as html or js script code that allows to transmit for example a messages export script, redirect to malicious sources, malware downloader or manipulated the exported messages itself. Then the attacker only waits, until the targeted user exports the file from the main.db and opens it unrestricted in the web-browser to execute. The same case of scenario is possible when the account is already updated to skype version v8.49.0.49 and older from skype v7 containing the already send message by the attacker. The vulnerability can be exploited by remote attackers with local low user interaction of a skype user account. The vulnerability has been tested and verified from microsoft skype v7.x up to client version v8.49.0.49. Exploitation of the vulnerability results in persistent manipulation of the exported html file, external malicious redirect, download of malicious sources, phishing attacks (messages/crdentials) or cross site scripting attacks. Vulnerable Client(s): [+] Skype v8.49.0.49 and older v8.x versions Vulnerable Module(s): [+] History Export Affected File(s): [+] index.html (Archived Conversations) [+] main.db Attacker Client(s): [+] Skype v7.x (Creation of Profile) Proof of Concept (PoC): ======================= The security vulnerability can be exploited by remote attackers with low user interaction. For security demonstration or to reproduce the issue follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... (Local PoC) 1. Open in a first step the skype 7.x version 2. Change in a second step the visible name to a test payload (script code) Note: >"%20[SPLIT]""><[INJECTED SCRIPT CODE PAYLOAD AS DISPLAY NAME]>%20%20 (USERNAME) 3. Save the name and now upgrade to version v8.x 4. Open your skype with the upgraded installation from v7.x to the newst skype v8.x 5. Move to the settings and open the messages tab 6. Choose the History Export Function for Skype v7.x 7. Generate the file via main.db of skype 8. The standard browser opens automatically with the generated archived conversations of skype v7.x html file 9. The injected script code executes in the moment the content loads in the html template 10. Successful reproduce of the vulnerability! Manual steps to reproduce the vulnerability ... (Remote PoC) 1. Open in a first step the skype 7.x version 2. Send a script code text message to the target test account Note: Using a simple iframe, img with source and on element Payload: >"%20[SPLIT]""><[INJECTED SCRIPT CODE PAYLOAD AS DISPLAY NAME]>%20%20 (USERNAME) 3. Wait until the target user account exorts the old message content locally and opens the file Note: The malicious interaction takes place when he opens the exact malformed message-body content 4. Successful reproduce of the vulnerability! PoC: Example >"%20[SPLIT]""><[INJECTED SCRIPT CODE PAYLOAD AS DISPLAY NAME]>%20%20 (USERNAME) --- Session Logs (GET) --- https://www.vuln-lab.com/ Host: www.vuln-lab.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: de,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate, br Connection: keep-alive Upgrade-Insecure-Requests: 1 --- PoC Source (Archived Conversations 7.x - main.db - Listing)---