Sub Domain Takeover

Disclosed: 2017-10-24 16:13:22 By b3nac To gratipay
None
Vulnerability Details
# One of Gratipay's sub domains points to Heroku with no app created. ## Description Gratipay's sub domain http://www.gratipay.com.herokudns.com/ points to Heroku but is not in use. ## Steps To Reproduce ###Details - Upon realization of vulnerability, installed and created a Heroku dependencies and application. - Added http://www.gratipay.com.herokudns.com/ to my list of domains through Heroku CLI. heroku domains:add www.gratipay.com.herokudns.com After verifying my Heroku account this was easy to point the sub domain to my application. - Uploaded my application with text "B3nac sub domain takeover POC." and refreshed the domain to find it pointed to my application successfully. ## Fix If the domain is not in use, then it is recommended to point the dns entry away from the third party program. ## Supporting Material/References: * I've attached the uploaded takeover python application/website screenshot.
Actions
View on HackerOne
Report Stats
  • Report ID: 221133
  • State: Closed
  • Substate: resolved
  • Upvotes: 16
Share this report