dns-configuration

1 article
sort: new top best
clear filter
0 7/10

A penetration tester discovered a critical vulnerability chain in a hosting provider that allowed subdomain takeover without DNS verification. The vulnerability stemmed from missing email confirmation during registration, IDOR in support tickets, and improper CloudFlare delegation architecture that allowed creating and controlling arbitrary subdomains of delegated domains.

Valeriy Shevchenko CloudFlare InfoSec Write-ups
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details