Subdomain takeover of ████
Critical
Vulnerability Details
**Summary:**
I was able to claim the subdomain: ████ using Microsoft Azure ( CDN profiles)
**Description:**
## Impact
Platform(s) Affected:
Subdomain
Azure CDN
## Step-by-step Reproduction Instructions
1. Using dig, I was able to determine that the subdomain '███████' was vulnerable to takeover. The record showed status: NXDOMAIN and was pointing to the CNAME: █████.
2. Using this information, I was able to create a new Azure CDN Profile with the name '██████████'. This would resolve to the CNAME record mentioned above.
3. I then created a Web App domain through Azure where I uploaded a small proof html file through FTP, I then set the CDN's origin type to WebApp and selected the url that I created earlier, this would serve the proof file (█████/proof.html) , Last and final step I set the custom domain to ███████ and enabled ssl.
4. I was then able to view the uploaded site at https://████████/proof.html
## Suggested Mitigation/Remediation Actions
To mitigate this issue you can:
Remove the DNS record from the DNS zone if it is no longer needed.
Claim the domain name in a permanent DNS record so it cannot be used elsewhere.
## Impact
This is extremely vulnerable to attacks as a malicious user could create any web page with any content and host it on the ████ domain. This would allow them to post malicious content which would be mistaken for a valid site. They could steal cookies, bypass domain security, steal sensitive user data, malware distribution, etc.
Actions
View on HackerOneReport Stats
- Report ID: 900062
- State: Closed
- Substate: resolved
- Upvotes: 18