How I found Multiple Bugs on CHESS.COM & they refused
作者使用Chess.com六年,并通过Bugcrowd测试其Web应用。发现用户资料页面存在JS崩溃漏洞,允许隐藏个人资料并阻止他人查看游戏和好友。利用payload如`/*/prompt(document.cookie)/*/`触发崩溃。 2025-10-9 09:0:25 Author: infosecwriteups.com(查看原文) 阅读量:15 收藏

Ayush

I bet you have heard about Chess.com even if you are just a little bit involved in the “chess world”. I have been playing and using their platform for around 6 years and I genuinely enjoy it.

Press enter or click to view image in full size

Photo by appshunter.io on Unsplash

You can read the full story here. Lets continue.

I was scrolling through bugcrowd when I thought Why shouldn’t I test their web application.

Press enter or click to view image in full size

I am only focusing on these 2 as they will be the focus of this article

I started with XSS. (Everyone does.. right? right?) and I found something. Not exactly XSS but a JS crash on the user profile which allows anyone to hide their profile from others which means NO ONE can view their games, see friends etc. A total Crash.

Press enter or click to view image in full size

payload used /*/prompt(document.cookie)/*/

Edit your Status with the payload and done.Easy right? Exploits are often simple.
I tried a bunch of payloads but only prompt with document attributes worked.

/*/prompt(document.domain)/*/   ---|
/*/prompt(document.cookie)/*/
---> these two crashed the page
/*/prompt(1)/*/ ----> didnot work

文章来源: https://infosecwriteups.com/how-i-found-multiple-bugs-on-chess-com-they-refused-1fa6e308ed1f?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh