World's largest domain name provider GoDaddy the presence of cross-site request forgery(CSRF)vulnerability-vulnerability warning-the black bar safety net

2015-01-22T00:00:00
ID MYHACK58:62201558265
Type myhack58
Reporter 佚名
Modified 2015-01-22T00:00:00

Description

!

Security engineer Dylan Saccomanni recently in GoDaddy domain management console is found on a cross-site request forgery(CSRF)vulnerability, an attacker exploit the vulnerability can control the user in the GoDaddy registered domain name. Godaddy is the world's largest domain name provider,with a Global domain name marketplace, the thirty percent share.

Vulnerability details

The vulnerability is Saccomanni1 on 1 7 Number in the management domain when found. An attacker could exploit the vulnerability edit the domain name service, change the automatic update settings or edit the domain name content.

Cross-site request forgery is similar to cross-site scripting vulnerabilitiesXSS, and most of the time, these vulnerabilities requires a combination of some deception or social engineering approach to causing harm. But this vulnerability is due to involved in domain name management, so it is relatively serious. An attacker can use cross site request forgery(CSRF)vulnerabilities in the user unknowingly control the domain name.

Below is a save the nameserver settings of the POST request:

POST/dcc50/Modals/DomainActions/NSManageWS. asmx/ValidateNameserver HTTP/1.1 Host: dcc.godaddy.com User-Agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:34.0) Gecko/20100101Firefox/34.0 Accept:application/json, text/javascript, /; q=0.01 Accept-Language:en-US,en;q=0.5 Accept-Encoding:gzip, deflate Content-Type:application/json; charset=utf-8 X-Requested-With:XMLHttpRequest Content-Length: 1 7 5 Cookie: [REDACTED] Connection: keep-alive Pragma: no-cache Cache-Control:no-cache

{'request':'{"isall":false,"nsobjs":[{"ns":"foo.example.com","ips":[],"index":0,"add":1,"status":""},{"ns":"bar.example.com","ips": [],"index":1,"add":1,"status":""}]}'}

[1] [2] next