DexKit / wordpress

Wordpress plugins of DexKit
MIT License
9 stars 17 forks source link

Security Report: Subdomain Takeover of storage.dexkit.com pointing to Digital Ocean #3

Closed aparcekarl closed 2 years ago

aparcekarl commented 2 years ago

Hi Dexkit Security Team,

Description

Recently I found this issue in one of your website *dexkit.com which suffer from possible Subdomain takeover attack. Please take a look at this:

http://storage.dexkit.com/ POC

I temporarily takeover the subdomain and hosted a sample website for POC. Please take a look

http://storage.dexkit.com/home.html

POC1

Everytime you navigate to the subdomain, you will be pointed to the website that I now already owned.

This vulnerability can reflect to an email leak from your company, due to the situation that the attacker can receive email transactions from the company and clients.

Please refer to this report for further information; https://hackerone.com/reports/388622 https://hackerone.com/reports/325336

Impact

I was able to hijack the domain storage.dexkit.com because an outdated DNS entry pointed to Digital Ocean. I created a resource in that web hosting and was able to host my own content accessible via your domain. HTML files located on this domain are able to use JavaScript to access globally-scoped non-HTTPOnly cookies. For example, a cookie used to authenticate against topsecret.dexkit.com is scoped to *dexkit.com, so a page on my hijacked domain can steal it.

This vulnerability is rated as severe due to the increased impact that can be escalated to a high severity threat and boils down to the registration of a domain by somebody else (with bad intentions) in order to gain control over one or more (sub)domains. This presents an interesting attack vector, which can even lead to several high severity risks, like this authentication bypass explained in a bug bounty report https://hackerone.com/reports/172137 by @ArneSwinnen.

Risk Breakdown

Risk: High Difficulty to Exploit: Easy Complexity: Easy Weakness Categories: Deployment Misconfiguration/Stored XSS/Authentication Bypass (CWE: 16) CVSS2 Score: 9.3 (AV:N/AC:M/Au:S/C:C/I:C/A:N) Reference: https://0xpatrik.com/subdomain-takeover/

Remediations

  1. Check your DNS-configuration for subdomains pointing to services, not in use
  2. Set up your external service so it fully listens to your wildcard DNS.
  3. Our advice is to keep your DNS entries constantly vetted and restricted.
  4. Preventing subdomain takeovers is a matter of order of operations in lifecycle management for virtual hosts and DNS. Depending on the size of the organization, this may require communication and coordination across multiple departments, which can only increase the likelihood for a vulnerable misconfiguration.
  5. Create an inventory of all of your organization’s domains and their hosting providers, and update it as things change, to ensure that nothing is left dangling.

Thank you

JoaoCampos89 commented 2 years ago

I am closing this issue as this is not related to this plugin. Contact me at info@dexkit.com

aparcekarl commented 2 years ago

Thank you for the response, Email Sent