A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone's account, according to details posted online. A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone’s account, according to details posted online. Skype said it would issue a fix next week.The consultant, Levent Kayan, based in Berlin, posted details of the flaw on his blog on Wednesday and notified Skype a day later. He said on Friday he hasn’t heard a response yet.The problem lies in a field where a person can input their mobile phone number. Kayan wrote that a malicious user can insert JavaScript into the mobile phone field of their profile. When one of their contacts comes online, the malicious user’s profile will be updated, and the JavaScript will be executed when the other contact logs in. Kayan wrote that the other person’s session could be hijacked, and it may be possible to gain control of that person’s computer. An attacker could also change the password on someone’s account. There are some mitigating factors, such as that the attacker and victim must be friends on Skype. Also, the attack may not immediately execute when the victim logs in. Kayan said he noticed the behavior happened only after the victim logged in several times. But he said in an e-mail that once it happens the first time, “it happens with each re-login.”Skype should be checking the input into the mobile phone field and validating that it is indeed a phone number and not executable code. The problem affects the latest version of Skype, 5.3.0.120, on Windows XP, Vista and 7 as well as Mac OS X operating system. Skype disagreed somewhat with Kayan’s description of the issue, characterizing it as minor.“Essentially it allows for one of your top contacts on Windows to display messages or redirect to websites within the SkypeHome page,” said Adrian Asher, Skype’s chief information security officer, in a statement.“In order to exploit this a person would have to be a validated contact of yours and one of the most frequent people you are in contact with, and therefore very unlikely to cause any issues in the real world, however it should not be like this and will be fixed,” he said.Send news tips and comments to jeremy_kirk@idg.com Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe