Google Talk DXImageTransform HTML Injection Vulnerability

Google Talk is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue by appending arbitrary script code to a filename extension to have the code execute in the browser of an unsuspecting user in the context of the affected application.

A successful attack may help the attacker steal cookie-based authentication credentials and launch other attacks.

Google Talk 1.0.0.104 is vulnerable; other versions may also be affected.

NOTE: Filesystem limitations for filenames will restrict what an attacker can append to an extension.


 

Privacy Statement
Copyright 2010, SecurityFocus