Subdomain Takeover of brand.zen.ly
Medium
Z
Zenly
Submitted None
Actions:
Reported by
mega7
Vulnerability Details
Technical details and impact analysis
Hello Gents,
### Background:
> + Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that subdomain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.
### Summary:
+ I just went to `brand.zen.ly` and it shows an error "Not Found", also I've checked the CNAME is pointing to `brandpad.io`, which means it can be added to any account.
+ This is pretty serious security issue in some context, so please act as fast as possible.
+ I was able to takeover `brand.zen.ly` by registering at **Brandpad**.
### Vulnerable URL:
+ https://brand.zen.ly
### Proof of Concept:
```
└─$ dig brand.zen.ly
brand.zen.ly. 255 IN CNAME brandpad.io.
```
+ Please visit: https://brand.zen.ly.
+ {F1610891}
### Recommended Fix:
+ Check your DNS-configuration for subdomains pointing to services not in use.
+ Set up your external service so it fully listens to your wildcard DNS.
## Impact
+ Subdomain takeover is abused for several purposes:
1. Malware distribution.
2. Phishing / Spear phishing.
3. XSS and steal cookies.
4. Bypass domain security.
5. Legitimate mail sending and receiving on behalf of Datadog subdomain.
Thanks and have a nice day!
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$750.00