Skip to content

Subdomain Takeover Possible via Landingi #117

Open
@messi96

Description

Service name

Landingi

Proof

Landingi is Vulnerable to Subdomain Takeover
If you get an Error Similar to this one

Fingerprint

  1. Create a new account get a free one for 14 days
  2. Create your own template ( landing page ) for the PoC similar to
$ cat aelfjj1or81uegj9ea8z31zro.html
<!-- PoC by username -->
  1. Add the subdomain under Domains in the left pane.
  2. Subdomain gets successfully verified if it is unclaimed or has dangling CNAME records ( cname.landingi.com. )
  3. On the selected landing page click MORE “...” to expand the list of available actions
  4. Select “PUBLISHING OPTIONS” on the dropdown And then “CHANGE URL” if you want to.
  5. Choose your domain from the list and add a path to it if needed.
  6. Save changes & Publish!
  7. Enjoy your leads.

Documentation

https://landingi.com/knowledge-base

Thanks :)

Metadata

Assignees

No one assigned

    Labels

    vulnerableSomeone has provided proof in the issue ticket that one can hijack subdomains on this service.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions