Subdomain takeover of images.crossinstall.com
High
X
X (Formerly Twitter)
Submitted None
Actions:
Reported by
ian
Vulnerability Details
Technical details and impact analysis
## Summary
images.crossinstall.com points to an AWS S3 bucket that no longer exists. I was able to take control of this bucket and put my own content onto it. I can now serve content on this domain, obtain a TLS certificate for this domain, etc.
If any customers or servers are pointing to anything within this domain, I could serve them arbitrary/malicious content. I could also use this in case your domain whitelists your own domain for OAuth, or if there are cookies scoped to the entire domain. Usually this can have a high impact.
## PoC
Visit images.crossinstall.com/index.html; an HTML comment with my username is present.
```
% dig images.crossinstall.com +short
assets.crossinstall.com.s3.amazonaws.com.
s3-1-w.amazonaws.com.
s3-w.us-east-1.amazonaws.com.
52.217.103.180
% curl images.crossinstall.com/index.html
<!-- hackerone/ian bugcrowd/iangcarroll -->
% whois crossinstall.com | grep Org
Registrant Organization: Twitter, Inc.
Admin Organization: Twitter, Inc.
Tech Organization: Twitter, Inc.
```
## Impact
Subdomain takeover
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Business Logic Errors