$500 Bounty: Subdomain Takeover on live.firefox.com via Unclaimed Fastly CNAME
文章描述了因未注册CDN条目导致的子域名接管风险,具体为firefox.com子域名live.firefox.com因CNAME指向Fastly但未配置,被研究人员接管并可能用于恶意攻击,凸显了此类技术问题对网络安全的重大威胁。 2025-7-5 02:45:21 Author: infosecwriteups.com(查看原文) 阅读量:18 收藏

How an Unregistered CDN Entry Could’ve Been Weaponized for Malware Campaigns and Cookie-Based Attacks

Monika sharma

When a domain as recognizable as firefox.com has a dangling subdomain, it’s not just a technical misstep—it’s an open door for phishing, malware delivery, and trust abuse.

Security researcher martinvw earned a $500 bounty from Mozilla by identifying and successfully proving a subdomain takeover vulnerability on live.firefox.com. The root cause? A CNAME pointing to Fastly without a corresponding service registration, allowing the researcher to claim the subdomain and serve arbitrary content under Firefox’s domain umbrella.

This write-up details the vulnerability, exploitation process, and the potential real-world impact of such an oversight.

A subdomain takeover occurs when:

  • A subdomain (e.g., live.firefox.com) points via CNAME to a service (like Fastly),
  • But that service is not claimed or configured by the original domain owner,
  • Allowing attackers to claim the endpoint and control what content is served.

文章来源: https://infosecwriteups.com/500-bounty-subdomain-takeover-on-live-firefox-com-via-unclaimed-fastly-cname-c7d1971e1a32?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh