Loading HuntDB...

Dangling cloud instance at vpn.inverselink.com

Low
H
HackerOne
Submitted None
Reported by ian

Vulnerability Details

Technical details and impact analysis

Business Logic Errors
**Summary:** ` vpn.inverselink.com` points to `54.202.130.246`, which is currently serving a TLS certificate for `Workday, Inc`. This seems to indicate that the subdomain is no longer controlled by HackerOne. ### Optional: Supporting Material/References (Screenshots) ``` % dig vpn.inverselink.com +short 54.202.130.246 % curl -v https://vpn.inverselink.com * Trying 54.202.130.246... * TCP_NODELAY set * Connected to vpn.inverselink.com (54.202.130.246) port 443 (#0) [...] * Server certificate: * subject: C=US; ST=California; L=Pleasanton; O=Workday Inc.; CN=*.workdaysuv.com ``` ### Optional: Did you use [recon data made available by HackerOne](https://github.com/Hacker0x01/helpful-recon-data) to find this vulnerability? no ## Impact Subdomain takeover if Workday releases this IP address

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$500.00

Submitted

Weakness

Business Logic Errors