Route53 Subdomain Takeover on test-cncf-aws.canary.k8s.io

Disclosed: 2021-01-16 06:07:13 By rhynorater To kubernetes
High
Vulnerability Details
## Summary: I discovered that it was possible to takeover ` test-cncf-aws.canary.k8s.io` by assigning a zone to that name with one of the following nameservers in Route53: ``` test-cncf-aws.canary.k8s.io. 3600 IN NS ns-265.awsdns-33.com. test-cncf-aws.canary.k8s.io. 3600 IN NS ns-687.awsdns-21.net. test-cncf-aws.canary.k8s.io. 3600 IN NS ns-1458.awsdns-54.org. test-cncf-aws.canary.k8s.io. 3600 IN NS ns-1825.awsdns-36.co.uk. ``` Once the zone was claimed, I was able to create DNS records under this host. Consider the following record: ``` poc.test-cncf-aws.canary.k8s.io ``` ##Steps To Reproduce: 1. See above domain ##Remediation Instructions Remove the NS record delegation NS privs on a subdomain before you delete the zone ## Impact With this vulnerability, an attacker can host arbitrary content under your domain. This can allow an attacker to host brand-damaging materials, steal sensitive * scoped session cookies, and even escalate other vulnerabilities.
Actions
View on HackerOne
Report Stats
  • Report ID: 794382
  • State: Closed
  • Substate: duplicate
  • Upvotes: 12
Share this report