Loading HuntDB...

Subdomain takeover of fr1.vpn.zomans.com

Medium
Z
Zomato
Submitted None
Reported by ian

Vulnerability Details

Technical details and impact analysis

Business Logic Errors
## Summary fr1.vpn.zomans.com points to an AWS EC2 instance at 52.47.57.107 that no longer exists. I was able to take control of this IP address and run my own EC2 instance. I can now serve content on this domain, obtain a TLS certificate for this domain, etc. If any customers or servers are pointing to anything within this domain, I could serve them arbitrary/malicious content. I could also use this in case your domain whitelists your own domain for OAuth, or if there are cookies scoped to the entire domain. Usually this can have a high impact. Since the risk of employee phishing here is pretty high, along with the risk of existing clients connecting to this server, I think it qualifies as a High per your policy: > Subdomain Takeover - on a domain that sees heavy traffic or would be a convincing candidate for a phishing attack ### PoC ``` % dig +short fr1.vpn.zomans.com 52.47.57.107 % curl fr1.vpn.zomans.com <!-- hackerone.com/ian --> ``` ## Impact Subdomain takeover

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$350.00

Submitted

Weakness

Business Logic Errors