Loading HuntDB...

RCE on partner.steampowered.com

Critical
V
Valve
Submitted None

Team Summary

Official summary from Valve

Insufficient validation of parameters allowed an attacker to specify the name of a PHP function to call with parameter types (array, array, string). This could be changed to a call with parameter types (string string) using array_diff_uassoc. This enabled calling assert, which at the time invoked eval, enabling arbitrary code execution.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Command Injection - Generic