43 lines
1.1 KiB
YAML
43 lines
1.1 KiB
YAML
id: shopify-takeover
|
|
|
|
info:
|
|
name: shopify takeover detection
|
|
author: pdteam,philippedelteil,Imjust0
|
|
severity: high
|
|
reference:
|
|
- https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75
|
|
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/32
|
|
- https://github.com/EdOverflow/can-i-take-over-xyz/issues/46
|
|
- https://hackerone.com/reports/1711890
|
|
tags: takeover,hackerone
|
|
metadata:
|
|
max-request: 1
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- Host != ip
|
|
|
|
- type: word
|
|
words:
|
|
- 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"'
|
|
- "Sorry, this shop is currently unavailable."
|
|
- "Sorry, this store is currently unavailable."
|
|
condition: or
|
|
|
|
- type: word
|
|
words:
|
|
- 'shop-not-found'
|
|
|
|
- type: dsl
|
|
dsl:
|
|
- '!contains(host,"myshopify.com")'
|
|
- '!contains(host,"shopify.com")'
|
|
condition: and
|