This writeup describes an information leakage vulnerability in Trillian Pro where Yahoo credentials are stored in plaintext in a temporary HTML file. The file is not deleted until Trillian is shut down, potentially exposing credentials to lower-level users or in cases of abnormal termination.
Classification
Writeup 100%
Target:
Trillian Pro <= 2.01
No auth needed
Prerequisites:
User must have Trillian Pro installed and configured to check Yahoo email · User must have clicked the link in the Yahoo email notification popup