Closed aparcekarl closed 2 years ago
Thanks @aparcekarl. We'll forward this to security as well.
Here is the page rule used by this subdomain:
Perhaps making this into a Cloudflare worker, we can block the threat.
Yes, that’s a good remediation
Hi @aparcekarl and @MicaiahReid ,
I made a small change to the dummy DNS record. Is the relay subdomain still vulnerable?
If yes, we will create a stronger page rule or Cloudflare worker.
We should also look into the solc subdomain, as I believe it is susceptible to the same vulnerability.
Appreciate your help,
Joshua
@jlazoff I was unable to exploit this before, since GitHub requires domain verification first. Were you able to exploit it?
@jlazoff
It's all fixed now. great work.
https://solc.trufflesuite.com/ this is not vulnerable. Thanks
Excellent, replacing the dummy or broken GitHub cname, with a dummy A IP address seems to have fixed everything!
@jlazoff Great work. Is this eligible for a bounty? And the other report? thank you
Hi @aparcekarl, I've reached out to the security team to check. We'll get back to you soon!
Hi @aparcekarl, I just spoke with the security team. We are still in the process of adding Truffle assets to the ConsenSys bounty program. However, we believe that this find is worth giving a retroactive bounty!
Please submit a report to HackerOne and ask to be redirected to the security team at our request. Given the nature of these two issues stemming from the same domain, they should be combined into one report, but please link to both github issues:
-https://github.com/trufflesuite/trufflesuite.com/issues/1194 -https://github.com/trufflesuite/trufflesuite.com/issues/1193
Thanks so much for your help! Closing this issue now that it's resolved.
Thank you so much. Report submitted to hackerone. https://hackerone.com/reports/1560671
Hi Trufflesuite Security Team,
I just want to reach out to you. I'm trying to submit this report weather your interested on it.
Thanks for taking a look.
Recently, i just found some of your subdomain (*trufflesuite.com) pointing to vulnerable Third Party site "Github"
This issue is about your subdomain being misconfigured in Github
https://relay.trufflesuite.com/
This vulnerability can reflect to an email leak from your company, due to the situation that the attacker can receive email transactions from the company and clients.
Please refer to this report for further information; https://hackerone.com/reports/388622 https://hackerone.com/reports/325336
Impact
I was able to hijack the domain relay.trufflesuite.com because an outdated DNS entry pointed to Github. I created a resource in that web hosting and was able to host my own content accessible via your domain. HTML files located on this domain are able to use JavaScript to access globally-scoped non-HTTPOnly cookies. For example, a cookie used to authenticate against topsecret.trufflesuite.com is scoped to *.trufflesuite.com, so a page on my hijacked domain can steal it.
This vulnerability is rated as severe due to the increased impact that can be escalated to a high severity threat and boils down to the registration of a domain by somebody else (with bad intentions) in order to gain control over one or more (sub)domains. This presents an interesting attack vector, which can even lead to several high severity risks, like this authentication bypass explained in a bug bounty report https://hackerone.com/reports/172137 by @ArneSwinnen.
The attacker can use this method to steal cookies by hosting malicious javascript/spread malware/steal money by setting up the sale/setup fake dapp application to steal private keys/ steal login details of users/spear-phishing/authentication bypass and other bad stuff.
Risk Breakdown
Risk: Severe Difficulty to Exploit: Easy Complexity: Easy Weakness Categories: Deployment Misconfiguration/Stored XSS/Authentication Bypass (CWE: 16) CVSS2 Score: 9.3 (AV:N/AC:M/Au:S/C:C/I:C/A:N) Reference: https://0xpatrik.com/subdomain-takeover/
Remediations
Thank you