When your carrots try to fight you!
Was doing a bit of rabbitholin' when I came across an interesting looking domain: n0rb3r7.com. The domain was registered using Cross-Site-Scripting (XSS) techniques for some of the WHOIS information. This creates a nice WATERHOLE type attack vector when users query public WHOIS LOOKUP websites and get back rendered JAVASCRIPT packed with goodies. Below are some of the sites we observed not validating/sanitizing output for their users (excluding ICANN which is safe for now). Doh!
NIBBLET: Appears to be the work of a 'Chase Miller'. Well played sir...
https://hackerone.com/n0rb3r7?sort_type=latest_disclosable_activity_at&filter=type%3Aall%20from%3An0rb3r7&page=1&range=forever
ICANN Whois Lookup for 'n0rb3r7.com':
https://hackerone.com/n0rb3r7?sort_type=latest_disclosable_activity_at&filter=type%3Aall%20from%3An0rb3r7&page=1&range=forever
ICANN Whois Lookup for 'n0rb3r7.com':
(NOTE: Safe to View / NO XSS rendered!)
UNSAFE WHOIS RESULTS FOR 'n0rb3r7.com':
(NOTE: XSS IS LIVE! THESE CARROTS WILL ATTACK!)
1. WHOIS.COM - hXXps://www[.]whois[.]com/whois/n0rb3r7.com
-----------------------------------------------------------------------------
2. WA-COM.COM - hXXp://wa-com[.]com/n0rb3r7.com
3. TUCOWS - hXXp://www[.]tucowsdomains[.]com/whois
-----------------------------------------------------------------------------
4. WHOISOLOGY - hXXps://whoisology[.]com/n0rb3r7.com
-----------------------------------------------------------------------------
5. DNSSTUFF --
hXXp://www[.]dnsstuff[.]com/tools#whois|type=domain&&value=n0rb3r7.com
-----------------------------------------------------------------------------
6. PUREWHOIS - hXXps://www[.]purewhois[.]com/index.php
-----------------------------------------------------------------------------
No comments:
Post a Comment