[go: up one dir, main page]

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Acquia Takeover #103

Open
KeepWannabe opened this issue Jun 18, 2019 · 9 comments
Open

Acquia Takeover #103

KeepWannabe opened this issue Jun 18, 2019 · 9 comments

Comments

@KeepWannabe
Copy link

Can i Takeover via acquia ?

image

@random-robbie
Copy link
Contributor

I am currently struggling with this as it creates random subdomains so far and i am not looking to upgrade to find out about the prod.

@mcipekci
Copy link

This is not vulnerable because of following reasons:

  1. Acquia generates a generic unique IP address for customers when creating environment.
  2. Since IP address is unique, you must either spam creating environments yet it's still unclear and each creation process takes around 30 minutes.
  3. To enable adding custom domain feature, you must subscribe for it and it's way too much costly, while they do not directly charge you, it's still not worth because of unclear state of IP address is being used or not

Let me show you some information with screenshots

As we can see from below Acquia generates unique IP:
ipaddress

When adding custom domain Acquia verifies that domain is resolving into IP address they provided you:
failed

I also used one of my own domains to verify the state:
skima

So basically Acquia is not vulnerable or way over edge case.

@bayotop
Copy link
Contributor
bayotop commented Jul 25, 2020

Was digging into this lately and found https://docs.acquia.com/resource/definitions/realm/:

Some common realms include, but aren’t limited to the following:

  • Cloud Platform Enterprise: prod
  • Cloud Platform Professional: devcloud
  • Site Factory: The value can vary for Site Factory subscribers. To identify the correct realm for an Site Factory subscription, contact Acquia support.

Cloud Platform will display the realm for your subscription in the default domain name included with your subscription. For example, a default domain name for a website in an Cloud Platform Professional subscription can be examplesite.devcloud.acquia-sites.com.

It seems that the aforementioned (randomly generated subdomains etc.) is true for "Cloud Platform Professional" customers. Enterprise customers seem to have predictably generated subdomains with a different "realm" — the devcloud vs. prod part in the provided URL.

tldr;

"So basically Acquia is not vulnerable or way over edge case."

@whisperer256
Copy link

What is the CNAME for this service?

@FUCKGITHUBS
Copy link

lol (2)
txt

rtcms added a commit to rtcms/nuclei-templates that referenced this issue Apr 4, 2021
Updated severity to info because it' not vulnerable according to EdOverflow/can-i-take-over-xyz#103
@FUCKGITHUBS
Copy link
FUCKGITHUBS commented Feb 1, 2022 via email

@OVERPEY
Copy link
OVERPEY commented Sep 3, 2022

how to get free trial on this service ?

@shopsaver
Copy link

Hi I have takeover the a acquia cloud subdomain of Starbucks where I get $640 because the domain was disconnected after free trial so only $640 it is a vulnerable subdomain you can use whatweb tool to see the vulnerable if the content has Acquia HTML install
something like this then it is 100% vulnerable one
Here is one hackerone disclosed report mine report was not published now but there is one

https://hackerone.com/reports/874482

@pdelteil
Copy link
Contributor
pdelteil commented Jan 3, 2024

Hi I have takeover the a acquia cloud subdomain of Starbucks where I get $640 because the domain was disconnected after free trial so only $640 it is a vulnerable subdomain you can use whatweb tool to see the vulnerable if the content has Acquia HTML install something like this then it is 100% vulnerable one Here is one hackerone disclosed report mine report was not published now but there is one

https://hackerone.com/reports/874482

This is just a dangling subdomain not a takeover.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

10 participants