AWS subdomain takeover of www.███████

Disclosed: 2021-10-28 20:18:39 By al-madjus To deptofdefense
High
Vulnerability Details
**Description:** The AWS bucket hosted on `www.████████` was vulnerable to a subdomain takeover. It has a DNS record pointing to an unclaimed bucket that I was able to register and serve a PoC on. ## References Output of `dig`: ``` ;; QUESTION SECTION: ;www.███████. IN A ;; ANSWER SECTION: www.████. 1833 IN CNAME ██████████. ███. 60 IN A ███████ █████. 60 IN A ███ █████████. 60 IN A ████████ █████. 60 IN A ███ ;; AUTHORITY SECTION: █████. 1831 IN NS ████. ███. 1831 IN NS █████████. ███████. 1831 IN NS ██████. ██████. 1831 IN NS ██████████. ;; ADDITIONAL SECTION: █████████. 151098 IN A ████ ████. 153636 IN A ████████ █████. 132552 IN A █████ ███████. 6009 IN A ███ ████. 56631 IN AAAA ███ ``` ## Impact The impact for a subdomain takeover can be varied and wide: potentially steal cookies, bypass CSP and CORS policies, bypass domain whitelisting for SSRF, spy on legitimate requests sent to that domain, phising vector, etc. ## System Host(s) www.█████████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce Go to https://www.███████/█████████████████ which is the PoC I have hosted. ## Suggested Mitigation/Remediation Actions Please remove all dangling DNS records if they are not needed, or claim the buckets if they are.
Actions
View on HackerOne
Report Stats
  • Report ID: 1329792
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report