Loading HuntDB...

Subdomain takeover of storybook.lystit.com

High
L
Lyst
Submitted None
Reported by parzel

Vulnerability Details

Technical details and impact analysis

Privilege Escalation
# Summary: The subdomain storybook.lystit.com had an CNAME record pointing to an unclaimed S3 bucket. This is a high severity security issue because an attacker can register the bucket on AWS and therefore can serve her own content on the subdomain. This allows for various attacks. # Description: The dangling CNAME record of storybook.lystit.com is pointing to ███████ and the bucket which could not be found was: "storybook.lystit.com". I was able to register a S3 bucket with this name in AWS. After enabling static website hosting I was able to takeover the subdomain and serve arbitrary content. I am serving a POC to proof I am controlling the subdomain as well as a simple XSS POC. # POC POC: view-source:http://storybook.lystit.com/ Stored XSS: http://storybook.lystit.com/asdjklkas1312das879123.html {F691531} {F691530} # Supporting Material/References: https://www.hackerone.com/blog/Guide-Subdomain-Takeovers # Recommendations for fix Remove the dangling CNAME record from storybook.lystit.com ## Impact The domain takeover allows various attacks. As the full domain is attacker controlled it can be used to serve XSS attacks, phishing campaigns and might be used to bypass the Same Origin Policy on other lystit.com domains and services.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1000.00

Submitted

Weakness

Privilege Escalation