Loading HuntDB...

Reflected XSS in www.dota2.com

Medium
V
Valve
Submitted None
Reported by jr0ch17

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Reflected
Hi guys, ##Description I found another XSS in www.dota2.com. This time it is located in **http://www.dota2.com/international/live/5/5/1**. However it seems that when you can change the /5/5 folders to any other number (to confirm) and it still worked. I tested this on http://www.dota2.com/international/live/1/1/1 and with other random digits. ##Steps to reproduce 1. Using any browser (except IE), go to `www.dota2.com/international/live/5/5/1})}});alert(document.cookie);(test=>{{({<!--` 2. You'll see an alert box with your cookie. I was able to confirm the XSS works in Firefox, Chrome and Opera so the payload successfully bypasses the Chrome XSS filter since the reflection point is directly in a javascript. {F241581} ## Impact As you know, with a reflected XSS, a malicious user could trick a user into browsing to a URL which would trigger the XSS and steal the user's cookie, capture keyboard strokes, etc and eventually take over a user's account. Thanks, JR0ch17

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$350.00

Submitted

Weakness

Cross-site Scripting (XSS) - Reflected