Subdomain takeover on happymondays.starbucks.com due to non-used AWS S3 DNS record
High
S
Starbucks
Submitted None
Actions:
Reported by
dpgribkov
Vulnerability Details
Technical details and impact analysis
Hi,
I discovered that happymondays.starbucks.com DNS CNAME record is pointing to S3 AWS bucket which doesn't exist. Here's the screenshot of vulnerable domain: {F138556}
As happymondays.starbucks.com was free to register on AWS S3 service and DNS-setup is already correct set-up: {F138557}
I was able to claim the domain for PoC using the following set-up: {F138558}
Also I have placed a two files located under root directory for validation: {F138559}
For mitigation you should immediately remove the DNS-entry for this domain.
As you might consider, the impact of this are pretty significant. I now can publish whatever I want on this domain, even fetching httpOnly cookies. I would also be able to register SSL certificate for this domain through Let's Encrypt (it is only need meta/file verification to issue the certificate) That would end up with the ability to read secure cookies as well.
In addition, there's no way at all for a visitor of this page to validate that the content on this domain is not served by Starbucks, making it extremely easy to utilize this for targeting the organization by fake login forms / spear phishing using your own domain to plant the attack.
Cheers,
Danil
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Privilege Escalation