Loading HuntDB...

Subdomain Takeover at https://new.rubyonrails.org/

High
R
Ruby on Rails
Submitted None
Reported by nagli

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
## Disclaimer I know it's OOS but the issue is pretty serious because of the attractive domain name "new.rubyonrails.org" basically anyone could have put malware there. ## Summary Hi! I discovered that new.rubyonrails.org was pointing to an unclaimed Github Page, making it vulnerable to subdomain takeover. I've managed to claim it in my Github-account and added a simple html file as POC: {F1548667} `https://new.rubyonrails.org` ## Mitigation - Remove the DNS record Best regards, nagli ## Impact Subdomain takeovers can be used for - Cookies set to the root domain will be shared with this subdomain and can be obtained - Stored XSS (arbitrary javascript code can be executed in a users browser) - Phishing - Hosting malicious content

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Privilege Escalation