Stored XSS in the guide’s GameplayVersion (

Below are the steps to reproduce the XSS vulnerability

  1. Open dota2 client and create new simple guide with XSS in the name.
  2. Publish this guide on steam.
  3. Now go to the Fiddler app and look at the request from dota2 client:

The XSS script placed in the title, the title displays a safe HTML on the site, so, for now nothing terrible happens.

4) Next I write some piece of code in the Fiddler app:

if (oSession.uriContains("/cloud/CB/")) {
var strBody=oSession.GetRequestBodyAsString();

So I transfer the XSS script from “Title” to “GameplayVersion”. I decided to go this way, since in this case the content length of build’s file does not change and it successfully passes the hash sum comparison.

5) Now we return to the dota2 client, click “Edit” and change anything in the our build and publish it again. And we see that the PUT request was successful and the XSS data in it is arranged the way we wanted:

6) Next i follow to the Dota2 Workshop Manager.

And here we see our public file ID. This connection with the public guide files I was found in the preparation of the previous report, but I did not know how to apply it (before today).

7) Put this FileID into a link below and we get the public infected page:

And the result in the latest versions of Firefox and Chrome:


As on any cross-site-scripting vulnerability. The top line would be that the attacker might steals cookies to abuse users session.

Have a happy cross site scripting 😃

10/07/2018 ~ Report Vulnerability
02/08/2019 ~ Bug Valids.
08/03/2019 ~ -Patched / Fixed ( Bounty Rewarded $750)


Join Discord :