This vote is to decide on a reward/bounty payout for a security issue found. The following is the full submitted report by the individual who found it. This has been confirmed and fixed.
Hey Security Team,
I am Anil Bhatt Security Researcher Who Often Loves To Report Vulnerabilities & Issues In Websites, Systems Of Different Firms, And Industries To Make Them Secure.
Vulnerability Sub-domain Takeover severity: High [P2] https://www.acunetix.com/vulnerabilities/web/hostile-subdomain-takeover/
Description: A subdomain takeover occurs when an attacker gains control over a subdomain of a target domain. Typically, this happens when the subdomain has a canonical name (CNAME) in the Domain Name System (DNS), but no host is providing content for it. This can happen because either a virtual host hasn’t been published yet or a virtual host has been removed. An attacker can take over that subdomain by providing their own virtual host and then hosting their own content for it. If an attacker can do this, they can potentially read cookies set from the main domain, perform cross-site scripting, or circumvent content security policies, thereby enabling them to capture protected information (including logins) or send malicious content to unsuspecting users.
Vulnerable Domain: https://demo.sarcophagus.io/ ==>CNAME is Pointing to GitHub
Steps:
as you can see a subdomain takeover is done with your sub-domain. POC https://demo.sarcophagus.io/1
[+]Impact: Subdomain takeover is a high severity vulnerability as pr CVSS v3 attacks can exploit it easily and host anything that defamations of your company and directly impact your assets reputation. An attacker can easily manipulate users to get attracted to this fake portal and harvest their data or it can be used to spread unusual content which can directly affect the reputation of the company. Can be dangerous as an attacker can post malicious content or fool users as he is able to take over your sub-domain.
XSS Phishing Bypass domain security Steal sensitive user data, cookies, etc. company defamation This kind of IMPACT can be done: Cookie Bombing Leading to DOS, Initiating Malicious Transactions/initiating fake transactions, loss of user funds, and spoofing other users by hosting the same UI Domain with a Malicious contract.
Suggested Mitigation/Remediation Actions:
Remove the Domain DNS entry
recent publicly exploit: https://twitter.com/samwcyo/status/1522037756754550784?t=gC2hOeKB0a4gW6HM-grsZg&s=19
I was able to take over this domain, I can host whatever I want to, it's easy to exploit by hosting a similar UI with a fake contract. Or wallet, or defame about the company, FuD. make some FAKE NFT project to scam your real users..
If You Like My Work I Would Prefer To Have A Bounty Because IT Take A lot Of Efforts To Find Issues And Report Before Attacker Misuse
Thanks & Regards 🙏 Name: Anil Bhatt Email/Paypal: nighthack00@gmail.com ETH address: 0x3FEdeEeA7Bf7b1Ff2E3f7514A17F72CF61E8f169