-
-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Statuspage service is still vulnerable . #105
Conversation
Thank you for the pull request, @prial261. Please update the issue ticket with these details , link directly to your comment in the table reference, and then please add an actual fingerprint if possible in the "Fingerprint" column. I am trying to keep the table as uniform as possible; thank you for your understanding. |
Thank you, @prial261. |
Has someone informed Statuspage about this? |
@JLLeitschuh , Informed . No replay from them :') |
@prial261 what about this scenario ? |
If I am not wrong statuspage was known to be vulnerable before you created this issue. If what I have just said is true, I don't agree with taking an exact copy of the knowledge from this repository or another source and try to make money out of it. |
@melardev , no you are wrong . Before creating this pull statuspage was Not Vulnerable . According to #65 Statuspage no longer vulnerable what was created before my pull then I discovered that they are not doing proper verification of ownership what can be bypassed and that's why I reported it to them to let them know and I also wasn't expecting a bounty for that report and also this is not about earning $$$ , If I wish to do that then I would search for vulnerable companies rather then reporting to directly to the company . You can see more info from :- https://help.statuspage.io/help/domain-ownership cheers |
@prial261 I was not making an accusation against you because I was not quite sure, No hate to nobody, just saying what I think is fairer and more respectful to the original finders. |
Hi @melardev , |
I'm surprised Atlassian was fine with this being publicly disclosed before they fixed it. Their BB program explicitly calls out disclosure is only allowed if they agree to disclosure. |
@JLLeitschuh , Sadly I though to report it after pulling it here , I also added this link as reference in that report too . |
Looks no more vulnerable (maybe in some old specific cases, or maybe in cases where some box share same dns pointing..) |
Recently, I've come across a subdomain "xyz.program.com" pointing to statuspage services. I'm able to add the subdomain to my statuspage account. This was not working for couple of other programs, and I would get the message, the Custom domain is already in use. In the past, on completion of setting up the custom domain to your page, when visiting the custom domain (without activating) would redirect you to your page, hence confirming the takeover. The POC would required a $29 plan to redirect to work for the public. Now, for the "xyz.program.com" it is still redirecting to the statuspage homepage. Anyone aware if activating the account, would ensure the POC to be hosted. I do not want to spend $29, if it won't work. Thanks |
Can stspg-customer.com subdomain still be taken over? |
@daxin09pp , This issue was fixed from their side , so No more Takeover Possible . I will push update soon on this repo . |
Thank you for your quick reply. @prial261 |
Status page pushed a DNS verification in order to prevent malicious takeovers what they mentioned in https://support.atlassian.com/statuspage/docs/configure-your-dns/ However when I created this Pull request I was able to bypass this DNS verification as there was no mechanism what verifies if the expected value for customers CNAME record matches with the statuspage account what was fixed later after my report to their program. So no more takeover here until any genius find any other way :D Happy hacking <3 |
On
May 21, 2019
statuspage realised DNS Configuration Requirements according to what to use a Custom Domain with statuspage users have to do ownership verification by pointing their subdomains to[unique_string].stspg-customer.com
.So no more subdomain takeover ? According to #65 Statuspage no longer vulnerable . But while testing a bug bounty program site I was able to takeover their unclaimed subdomain what was pointing to
[unique_string].stspg-customer.com
. The issue is Statuspage is serving contents to a domain before doing full proper DNS config validation .In case of my testing with company subdomain
status.site.com
was pointing to CNAMExxxz3xqnrnmx.stspg-customer.com
but when I added it to a page's Custom domain in Statuspage service it asked me to update your DNS for it to work & DNS config page Expected value was yyybgwgbwg25.stspg-customer.com .Clicking on Record revalidate says It doesn't look like the correct record has been set yet. as
status.site.com
was pointing to CNAMExxxz3xqnrnmx.stspg-customer.com
what is completely different from Expected valueyyybgwgbwg25.stspg-customer.com
. But ignore it ;)But when I visited status.site.com in browser it redirected me to
https://takeovered-by-prial261.statuspage.io
. So without proper validation of ownership of the domain I got ability to share contents on it .So attacker can claim a subdomain of a user without proper validation and serve contents on the subdomain .
Best Regards
Prial