STEAM - Phishing and Cross-site Scripting =========================================== = APP: STEAM - Valve Software = =========================================== - STEAM < http://www.steampowered.com > - Valve Software < http://www.valvesoftware.com > - Vulnerability Discovery: Gabriel Lima < gabriel (at) falandodeseguranca.com > - http://www.falandodeseguranca.com (in portuguese) =========================================== - Description - =========================================== It's possible to input JavaScript\HTML in Steam Store tab (inside Steam App.), using the Steam Protocol (steam://) which can be exploited in a html page. "steam://publisher/ Loads the specified publisher catalogue in the Store. Type the publisher's name in lowercase, e.g. activision or valve." When using a publisher name that doesn't exist, Steam Store sends the value to the search system, which is vulnerable to XSS. Store tab in Steam doesn't show the URL. Phishing is possible just redirecting the victim to the fake site. VALVE was contacted in May 10, but they didn't reply anything (May 18). Works in Internet Explorer. Tested under Windows XP SP 3 and Windows Vista. =========================================== - Proof of Concept - =========================================== [1] Alert with text xss steam://publisher/ [2] PHISING (in this example, it redirects to falandodeseguranca.com ) steam://publisher/ [3] Getting cookies: steam://publisher/ =========================================== - More Information - =========================================== The Paper showing how it works, a post with screenshots and a video could be found here: http://www.falandodeseguranca.com/2009/05/vulnerabilidade-no-steam-phishing-e-xss-na-steam-store/(In portuguese) More information: http://www.falandodeseguranca.com Contact me: gabriel falandodeseguranca.com