Summary by Nickguitar
.
.
https://globe.gov/
Web App
https://annualmeeting2022.globe.gov/
A subdomain takeover is when a misconfigured Domain Name System (DNS) record is re-registered to an endpoint owned by an attacker. An attacker is then able to redirect users to the endpoint and capture data such as cookies and credentials, perform Cross-Site Scripting (XSS) attacks, and potentially take over accounts in the legitimate application.
A subdomain takeover vulnerability was identified and successfully exploited on annualmeeting2022.globe.gov. The vulnerable subdomain was found to be pointed to us-east-1.galaxy-ingress.meteor.com, a domain associated with Meteor's hosting service. By registering an account on Meteor for $1 and deploying an application, I was able to serve arbitrary content on annualmeeting2022.globe.gov.
Subdomain takeover could lead to data theft and indirect financial loss through the attacker’s ability to interact with legitimate users. These malicious actions could also result in reputational damage for the business through the impact to customers’ trust. This vulnerability allows an attacker to serve arbitrary content, phishing pages, or malicious software through a trusted domain, potentially compromising the security and trust of visitors. It is also possible to perform XSS attacks to steal auth cookies from other subdomains.
https://annualmeeting2022.globe.govThe following screenshot show the success of a subdomain takeover:
The affected domain was pointing to a Meteor URL no longer in use
Deploying application to the specified Meteor URL
Application successfully deployed in the specified URL
I have now control of the contents of the page shown in the subdomain.