Loading HuntDB...

XSS in steam react chat client

Critical
V
Valve
Submitted None
Reported by zemnmez

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
The Steam chat client both sends and receives bbcode format chat messages. These map to HTML elements, and notably the [url] bbcode tag is supported for arbitrary URLs. React has strong XSS mitigations but does not mitigate `blocked:` URI based XSS. This is rather difficult to exploit as the client transmits sanitised messages and receives over a binary WebSocket. I've attached a video of executing this XSS, which is persistent. ## Impact I strongly believe an attacker could get remote code execution in Steam via this method. The Steam chat client uses the same codebase as the steam web chat client, and, I imagine does so using electron or some other webview system. These systems all expose functions which allow arbitrary calls to system to allow them to be competitive with e.g. windows forms.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$7500.00

Submitted

Weakness

Cross-site Scripting (XSS) - Stored