Reported By: Ezequiel [@ezequielpuig]Reported Date: 01/October/2023**Reported To: U.S. Department Of DefenseVulnerability Type: Subdomain TakeoverAffected URL**: www.███████
Hello U.S. Department Of Defense Security Team, I hope this report finds you well.
I want to bring to your attention a serious security issue that poses a significant risk to www.████████. This is related to a subdomain takeover vulnerability, which could allow malicious individuals to gain control over the subdomain and potentially misuse it for malicious purposes.
_Overview:
The affected subdomain is www.███, which currently points to an unclaimed CNAME record on the ████████.netlify.app. This situation allows anyone to potentially take ownership of the subdomain and manipulate its content. Since www.█████████ has a CNAME record pointing to ██████████.netlify.app, by changing the Host header to www.██████████, it is possible to visualize the malicious content hosted on █████████.netlify.app.
Here are a few scenarios where the Host header can be modified:
Proxy Servers: If you control a proxy server, you can intercept incoming requests and modify the Host header before forwarding the request to the intended destination. This is often done for load balancing, content caching, or security purposes.
DNS Spoofing: In a malicious context, an attacker might attempt DNS spoofing to redirect requests to a different server with a modified Host header.
Server-Side Scripting: If you have control over the server-side code that processes incoming requests, you can modify the Host header as part of your application logic.
Browser Extensions: Malicious browser extensions installed can modify the Host header for all outgoing requests.
_Proof of Concept (PoC):
This vulnerability materializes when an HTTP request is sent to www.██████████ with a manipulated Host header.
PoC via curl:
curl -skS https://www.███████ --header "Host: ███.netlify.app"
PoC via Burp Suite:
█████████
_Impact:
Subdomain takeover can be exploited for various malicious purposes, including:
Malware distribution
Phishing / Spear phishing attacks
Cross-Site Scripting (XSS) attacks
Authentication bypass
And more.
_Mitigation:
To address this issue and prevent potential abuse, I recommend taking the following steps:
Remove the CNAME record from the DNS zone for www.█████████.
Reclaim and register the affected subdomain (███.netlify.app) in the Netlify portal to prevent takeover by unauthorized entities.
I urge you to take swift action to remediate this vulnerability to safeguard the security and reputation of U.S. Department Of Defense.
//
Please feel free to reach out to me if you need any further information or assistance in resolving this matter.
Best regards,
Ezequiel Puig
HackerOne: https://hackerone.com/ezequielpuig
LinkedIn: https://linkedin.com/in/ezequielpuig
Mail: [email protected]
Impact detailed above.
www.██████████
Steps to reproduce detailed above.