subdomain takeover at █████████
Team Summary
Official summary from Mars
Summary: I discovered a subdomain takeover vulnerability at ██████████. The subdomain was pointing to an inactive or non-existent resource, allowing an attacker to claim the resource and take control of the subdomain. Details: While performing reconnaissance on █████, I noticed that the ███████ subdomain was pointing to a resource on a third-party service. However, upon further investigation, I found that the resource was either inactive or non-existent. This allowed me to claim the resource on the third-party service and take control of the ██████████ subdomain. As a result, I was able to serve arbitrary content on the subdomain Steps To Reproduce: I wanted to share with you that I have successfully claimed the domain at the following URL: ██████████. Please feel free to visit the website to see the changes I have made. You can also see a screenshot of the website below. Impact: A successful subdomain takeover can have severe consequences for the security of ██████ and its users. An attacker could utilise the takeover to serve malicious content, steal sensitive information, or launch further attacks against ████████ or its users. Thank you for your time and consideration. Best regards,
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Misconfiguration