Loading HuntDB...

Sub Domain Takeover

None
G
Gratipay
Submitted None
Reported by b3nac

Vulnerability Details

Technical details and impact analysis

# One of Gratipay's sub domains points to Heroku with no app created. ## Description Gratipay's sub domain http://www.gratipay.com.herokudns.com/ points to Heroku but is not in use. ## Steps To Reproduce ###Details - Upon realization of vulnerability, installed and created a Heroku dependencies and application. - Added http://www.gratipay.com.herokudns.com/ to my list of domains through Heroku CLI. heroku domains:add www.gratipay.com.herokudns.com After verifying my Heroku account this was easy to point the sub domain to my application. - Uploaded my application with text "B3nac sub domain takeover POC." and refreshed the domain to find it pointed to my application successfully. ## Fix If the domain is not in use, then it is recommended to point the dns entry away from the third party program. ## Supporting Material/References: * I've attached the uploaded takeover python application/website screenshot.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted