Reflected XSS in www.dota2.com
Medium
V
Valve
Submitted None
Actions:
Reported by
jr0ch17
Vulnerability Details
Technical details and impact analysis
Hi guys,
##Description
I found another XSS in www.dota2.com. This time it is located in **http://www.dota2.com/international/live/5/5/1**. However it seems that when you can change the /5/5 folders to any other number (to confirm) and it still worked. I tested this on http://www.dota2.com/international/live/1/1/1 and with other random digits.
##Steps to reproduce
1. Using any browser (except IE), go to
`www.dota2.com/international/live/5/5/1})}});alert(document.cookie);(test=>{{({<!--`
2. You'll see an alert box with your cookie.
I was able to confirm the XSS works in Firefox, Chrome and Opera so the payload successfully bypasses the Chrome XSS filter since the reflection point is directly in a javascript.
{F241581}
## Impact
As you know, with a reflected XSS, a malicious user could trick a user into browsing to a URL which would trigger the XSS and steal the user's cookie, capture keyboard strokes, etc and eventually take over a user's account.
Thanks,
JR0ch17
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$350.00
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected