AWS subdomain takeover of www.███████
High
Vulnerability Details
**Description:**
The AWS bucket hosted on `www.████████` was vulnerable to a subdomain takeover. It has a DNS record pointing to an unclaimed bucket that I was able to register and serve a PoC on.
## References
Output of `dig`:
```
;; QUESTION SECTION:
;www.███████. IN A
;; ANSWER SECTION:
www.████. 1833 IN CNAME ██████████.
███. 60 IN A ███████
█████. 60 IN A ███
█████████. 60 IN A ████████
█████. 60 IN A ███
;; AUTHORITY SECTION:
█████. 1831 IN NS ████.
███. 1831 IN NS █████████.
███████. 1831 IN NS ██████.
██████. 1831 IN NS ██████████.
;; ADDITIONAL SECTION:
█████████. 151098 IN A ████
████. 153636 IN A ████████
█████. 132552 IN A █████
███████. 6009 IN A ███
████. 56631 IN AAAA ███
```
## Impact
The impact for a subdomain takeover can be varied and wide: potentially steal cookies, bypass CSP and CORS policies, bypass domain whitelisting for SSRF, spy on legitimate requests sent to that domain, phising vector, etc.
## System Host(s)
www.█████████
## Affected Product(s) and Version(s)
## CVE Numbers
## Steps to Reproduce
Go to https://www.███████/█████████████████ which is the PoC I have hosted.
## Suggested Mitigation/Remediation Actions
Please remove all dangling DNS records if they are not needed, or claim the buckets if they are.
Actions
View on HackerOneReport Stats
- Report ID: 1329792
- State: Closed
- Substate: resolved
- Upvotes: 9