Dangling cloud instance at vpn.inverselink.com
Low
H
HackerOne
Submitted None
Actions:
Reported by
ian
Vulnerability Details
Technical details and impact analysis
**Summary:** ` vpn.inverselink.com` points to `54.202.130.246`, which is currently serving a TLS certificate for `Workday, Inc`. This seems to indicate that the subdomain is no longer controlled by HackerOne.
### Optional: Supporting Material/References (Screenshots)
```
% dig vpn.inverselink.com +short
54.202.130.246
% curl -v https://vpn.inverselink.com
* Trying 54.202.130.246...
* TCP_NODELAY set
* Connected to vpn.inverselink.com (54.202.130.246) port 443 (#0)
[...]
* Server certificate:
* subject: C=US; ST=California; L=Pleasanton; O=Workday Inc.; CN=*.workdaysuv.com
```
### Optional: Did you use [recon data made available by HackerOne](https://github.com/Hacker0x01/helpful-recon-data) to find this vulnerability?
no
## Impact
Subdomain takeover if Workday releases this IP address
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$500.00
Submitted
Weakness
Business Logic Errors