cloudfront

5 articles
sort: new top best
clear filter
0 6/10

A subdomain takeover vulnerability was discovered on live.lamborghini.com where an expired CloudFront distribution CNAME allowed an attacker to claim the subdomain by creating their own AWS S3 bucket and CloudFront distribution. The researcher demonstrated the attack by registering the subdomain and uploading malicious content, highlighting the risk of phishing and impersonation attacks.

Lamborghini live.lamborghini.com AWS CloudFront S3 Muhammad Khizer Javed
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details
0 7/10

A researcher discovered SQL injection in an AWS-hosted sports company's X-Forwarded-Host header by chaining host header enumeration with time-based SQLi, then bypassed character blacklisting using sqlmap's between.py tamper script to extract the entire database.

Avinash Jain logicbomb AWS CloudFront ELB sqlmap between.py
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details
0 5/10

A subdomain takeover of ping.ubnt.com via unclaimed Amazon CloudFront distribution combined with shared session cookies across *.ubnt.com subdomains enabled complete authentication bypass of Ubiquity's SSO system. The vulnerability was responsibly disclosed via HackerOne.

Ubiquity ubnt.com ping.ubnt.com sso.ubnt.com Amazon Cloudfront HackerOne Arne Swinnen
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details
0 8/10

Uber's SSO system was vulnerable to authentication bypass through a combination of subdomain takeover (dangling CloudFront CNAME on saostatic.uber.com) and session cookie theft via shared cookies across *.uber.com subdomains. An attacker could relay CSRF tokens and steal the _csid session cookie from authenticated users, then impersonate them across all Uber subdomains by injecting the stolen cookie into their own login flow.

Uber Amazon CloudFront saostatic.uber.com auth.uber.com Arne Swinnen Frans Rosén Jack Whitton
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details
0 4/10

Researcher discovered a subdomain takeover vulnerability in Bugcrowd's bugcrowdtrafficcontrol.com domain by exploiting misconfigured DNS pointing to Fastly and Pantheon services, allowing registration of the domain in his own CDN account. The vulnerability was reported to Bugcrowd and closed as N/A despite receiving a $600 bounty.

Bugcrowd bugcrowdtrafficcontrol.com Fastly CloudFront Pantheon Cloudflare MuhammadKhizerJaved
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details