Google Talk DXImageTransform HTML Injection Vulnerability

Google Talk is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue by appending arbitrary script code to a filename extension to have the code execute in the browser of an unsuspecting user in the context of the affected application.

A successful attack may help the attacker steal cookie-based authentication credentials and launch other attacks.

Google Talk is vulnerable; other versions may also be affected.

NOTE: Filesystem limitations for filenames will restrict what an attacker can append to an extension.


Privacy Statement
Copyright 2010, SecurityFocus