Subdomain takeover of storybook.lystit.com

Disclosed: 2020-01-22 14:38:48 By parzel To lyst
High
Vulnerability Details
# Summary: The subdomain storybook.lystit.com had an CNAME record pointing to an unclaimed S3 bucket. This is a high severity security issue because an attacker can register the bucket on AWS and therefore can serve her own content on the subdomain. This allows for various attacks. # Description: The dangling CNAME record of storybook.lystit.com is pointing to ███████ and the bucket which could not be found was: "storybook.lystit.com". I was able to register a S3 bucket with this name in AWS. After enabling static website hosting I was able to takeover the subdomain and serve arbitrary content. I am serving a POC to proof I am controlling the subdomain as well as a simple XSS POC. # POC POC: view-source:http://storybook.lystit.com/ Stored XSS: http://storybook.lystit.com/asdjklkas1312das879123.html {F691531} {F691530} # Supporting Material/References: https://www.hackerone.com/blog/Guide-Subdomain-Takeovers # Recommendations for fix Remove the dangling CNAME record from storybook.lystit.com ## Impact The domain takeover allows various attacks. As the full domain is attacker controlled it can be used to serve XSS attacks, phishing campaigns and might be used to bypass the Same Origin Policy on other lystit.com domains and services.
Actions
View on HackerOne
Report Stats
  • Report ID: 779442
  • State: Closed
  • Substate: resolved
  • Upvotes: 158
Share this report