High-Impact Subdomain Takeover
FQDN: wkp.weave.works
IP address: 13.49.241.153
Overview of the Vulnerability
A subdomain takeover is when a misconfigured Domain Name System (DNS) record is re-registered to an endpoint owned by an attacker. An attacker is then able to redirect users to the endpoint and capture data such as cookies and credentials, perform Cross-Site Scripting (XSS) attacks, and potentially take over accounts in the legitimate application.
A high-impact subdomain takeover vulnerability was identified which could impact the reputation and brand of the business. An attacker can register a subdomain on behalf of the target domain and use it to create a HTML document with JavaScript payload that triggers a Cross-Site Scripting (XSS) attack. The target domain can also be used to create a scenario where an attacker can harvest user credentials by phishing users who then visit and login on a cloned version of a legitimate website.
You could imagine an attacker creating any sort of website using this subdomain, including phishing sites, ransomware attacks, hosting malware, distributing porn or illegal content such as copyrighted materials. You could also imagine an attacker creating any number of other NFT or DeFi scam web pages, all under your company banner.
Business Impact
High-Impact subdomain takeover could lead to data theft and indirect financial loss through the attacker’s ability to interact with legitimate users. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust.
Steps to Reproduce
Browse to the URL https://wkp.weave.works/proof.txt
You will see my name
Browse to the URL https://weave.works/ and login
Browse to the URL https://wkp.weave.works/cookie-thief.php
You will see the cookies an attacker could steal, and possibly use to compromise an account
Click the COOKIE BOMB button
Browse to the URL https://weave.works/
You will receive an error and not be able to access this site or anything related until you clear your cookies, resulting in DoS
If you are reporting a potential vulnerability, you could ignore this section. It is intended to be managed by
a Vulnerability Manager
Report
security@weave.workson January 18...Describe
References
Handling
If you are reporting a potential vulnerability, you could ignore this section. It is intended to be managed by
a Vulnerability Manager