Loading HuntDB...

Subdomain takeover on wfmnarptpc.starbucks.com

High
S
Starbucks
Submitted None
Reported by 0xpatrik

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
Hello, this is pretty serious security issue in some context, so please act as fast as possible. Overview: One of the starbucks.com subdomains is pointing to Azure, which has unclaimed CNAME record. ANYONE is able to own starbucks.com subdomain at the moment. This vulnerability is called subdomain takeover. You can read more about it here: https://0xpatrik.com/subdomain-takeover-basics/ Details: wfmnarptpc.starbucks.com has CNAME to s00149tmppcrpt.trafficmanager.net. However, s00149tmppcrpt.trafficmanager.net is not registered in Azure cloud anymore and thus can be registered by anyone. After registering the TrafficManager Profile in Azure portal, the person doing so has full control over content on wfmnarptpc.starbucks.com. PoC: http://wfmnarptpc.starbucks.com/poc.html Mitigation: Remove the CNAME record from starbucks.com DNS zone completely. Claim it back in Azure portal after I release it Regards, Patrik Hudak ## Impact Subdomain takeover is abused for several purposes: Malware distribution Phishing / Spear phishing XSS Authentication bypass ... List goes on and on. Since some certificate authorities (Let's Encrypt) require only domain verification, SSL certificate can be easily generated.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Privilege Escalation