Startup vulnerability research and consultancy firm ReVuln says the way Steam
handles steam:// protocol URLs leaves users open to having vulnerabilities in Steam and their game exploited, reports Computerworld
, who say their request for comment on this was not immediately fulfilled by Valve (thanks Ant
). A proof-of-concept trailer
shows what they are talking about, and here's a bit:
According to tests performed by the ReVuln researchers, Internet Explorer 9, Google Chrome and Opera display warnings and the full or partial steam:// URLs before passing them to the Steam client for execution. Firefox also requests user confirmation, but doesn't display the URL and provides no warning, while Safari automatically executes steam:// URLs without user confirmation, the researchers said.
"All the browsers that execute external URL handlers directly without warnings and those based on the Mozilla engine (like Firefox and SeaMonkey) are a perfect vector to perform silent Steam Browser Protocol calls," the researchers said. "Additionally for browsers like Internet Explorer and Opera it's still possible to hide the dodgy part of the URL from being shown in the warning message by adding several spaces into the steam:// URL itself."