-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
High-Impact Subdomain Takeover #109
Comments
@morancj is investigating |
We should also do weaveworks/weave-gitops#3409 |
For context, this zone was created and delegated in https://github.com/weaveworks/corp/issues/495#issuecomment-558233088 |
Old config dig wkp.weave.works.
; <<>> DiG 9.18.11 <<>> wkp.weave.works.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 53040
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;wkp.weave.works. IN A
;; ANSWER SECTION:
wkp.weave.works. 157 IN A 13.49.241.153
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
;; WHEN: Wed Feb 15 15:11:44 GMT 2023
;; MSG SIZE rcvd: 60
dig NS wkp.weave.works.
; <<>> DiG 9.18.11 <<>> NS wkp.weave.works.
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38032
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;wkp.weave.works. IN NS
;; ANSWER SECTION:
wkp.weave.works. 819 IN NS ns-1597.awsdns-07.co.uk.
wkp.weave.works. 819 IN NS ns-1523.awsdns-62.org.
wkp.weave.works. 819 IN NS ns-380.awsdns-47.com.
wkp.weave.works. 819 IN NS ns-757.awsdns-30.net.
;; Query time: 70 msec
;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
;; WHEN: Wed Feb 15 15:16:55 GMT 2023
;; MSG SIZE rcvd: 184 |
A record and TXT record both removed. |
They kindly also set curl -IL http://13.49.241.153/cookie-thief.php
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 15 Feb 2023 15:55:41 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Set-Cookie: PHPSESSID=lh80709tfvjpnh8rv6b6tch2b6; expires=Mon, 14-Feb-2033 15:55:41 GMT; Max-Age=315532800; path=/; domain=.241.153
Expires: Thu, 31 Dec 2037 23:55:55 GMT
Cache-Control: max-age=315360000
Pragma: no-cache
X-Subdomain-Takeover: true |
how civilised of them |
We have likely junk in $ r53export.sh wkp.weave.works
; Using AWS profile sts
; Hosted zone ID: Z1TBOQ0594AGJ9
wkp.weave.works. 172800 IN NS ns-380.awsdns-47.com.
wkp.weave.works. 172800 IN NS ns-757.awsdns-30.net.
wkp.weave.works. 172800 IN NS ns-1523.awsdns-62.org.
wkp.weave.works. 172800 IN NS ns-1597.awsdns-07.co.uk.
wkp.weave.works. 900 IN SOA ns-380.awsdns-47.com. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
_c6b2ec19a73ea2206fc67b80ae577bda.wkp.weave.works. 300 IN CNAME _56468c26ed5f4cda97fe302815a675c7.mzlfeqexyx.acm-validations.aws.
demo.wkp.weave.works. IN ALIAS dualstack.d89b23d5-wkpui-wkpuialbing-603e-1976046370.eu-west-2.elb.amazonaws.com. ; HostedZoneId: ZHURV8PSTC4K8
dev.wkp.weave.works. 300 IN NS ns-1195.awsdns-21.org.
dev.wkp.weave.works. 300 IN NS ns-249.awsdns-31.com.
dev.wkp.weave.works. 300 IN NS ns-823.awsdns-38.net.
dev.wkp.weave.works. 300 IN NS ns-1712.awsdns-22.co.uk.
_acme-challenge.dev.wkp.weave.works. 300 IN TXT "jw2wful_5Cec4dBTLVPQZ6gxeD7uKvJr4hIF6vbvmtc"
docs.wkp.weave.works. 60 IN CNAME weaveworks.github.io.
_fa5b04d7b39c0d26cd2ac47ebf429f5b.mccp.wkp.weave.works. 300 IN CNAME _93ebb99073f87e1f41df0640795887d1.hkmpvcwbzw.acm-validations.aws.
wk-simon-2.wkp.weave.works. 300 IN CNAME 1172b3a1-wkpoauth-wkpoauth-1624-778069029.eu-north-1.elb.amazonaws.com
wkp-wk-simon-2.wkp.weave.works. 300 IN TXT "heritage=external-dns,external-dns/owner=default,external-dns/resource=ingress/wkp-oauth/wkp-oauth-alb-ingress"
$ r53export.sh dev.wkp.weave.works
; Using AWS profile sts
; Hosted zone ID: Z06887422P2J81C9U51JB
dev.wkp.weave.works. 172800 IN NS ns-1195.awsdns-21.org.
dev.wkp.weave.works. 172800 IN NS ns-249.awsdns-31.com.
dev.wkp.weave.works. 172800 IN NS ns-823.awsdns-38.net.
dev.wkp.weave.works. 172800 IN NS ns-1712.awsdns-22.co.uk.
dev.wkp.weave.works. 900 IN SOA ns-1195.awsdns-21.org. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
charts.dev.wkp.weave.works. IN ALIAS d1ksdw3ce0kn9v.cloudfront.net. ; HostedZoneId: Z2FDTNDATAQYW2
_ac93eefa0e75933bfe529aa5ea0e8a47.charts.dev.wkp.weave.works. 300 IN CNAME _7e55bbcd784d138f0179448945f6b8c2.bcsdcprczz.acm-validations.aws. |
@foot might know if we need any of these, otherwise we have to do some extra work |
Intestingly, MSFT have a tool for Azure to detect dangling DNS entries here. |
Stuff from my temp. repo's README, before I forget DNS hijacking enumerationPrerequisitesnuclei-templates Searchsubfinder -d weave.works -recursive -output subfinder-recursive-weave.works.out CheckBroadnuclei -project -project-path nuclei -tags 'dns' \
-list subfinder-recursive-weave.works.out Focussednuclei -project -project-path nuclei \
-list subfinder-recursive-weave.works.out \
-templates nuclei-templates/dns/detect-dangling-cname.yaml Referenceshttps://dhiyaneshgeek.github.io/bug/bounty/2020/02/06/recon-with-me/ |
Yeah this is the important one Others like simon, demo can all go I think |
Report
[email protected]
on January 18...Describe
References
Handling
If you are reporting a potential vulnerability, you could ignore this section. It is intended to be managed by
a Vulnerability Manager
The text was updated successfully, but these errors were encountered: