Open Snoarlax opened 1 year ago
There are limitations: If we want to host a login page on the "*.
This is problematic from the perspective of the attacker, as we cannot run arbitrary JavaScript on the page. We can configure the redirect URL so it does have some potential impact for something along the lines of a phishing vector. I have not tested if we can extract passwords submitted to this form using a lambda either however.
I'd be keen on hearing your thoughts on whether this constitutes a valid subdomain takeover vector.
I don't think it's possible to perform a takeover since to delete the user pool it's required to remove custom domains.
Also, cloudfront.net domain is used as an alias, working as a intermediate domain
between the Cognito custom domain and the user/company custom domain.
Service name
Amazon Cognito
Proof
Documentation
https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-app-integration.html "Setting up the hosted UI with the Amazon Cognito console"