- Sản phẩm & Dịch vụSản phẩm & Dịch vụ
- Giải phápGiải pháp
- Bảng giáBảng giá
- Công tyCông ty
- Tài liệuTài liệu
vi
vi
Trung Nguyen

As I described in the chapter one, we can control the content of a sub-domain d by controlling the content of domain d1 that d points to through its CNAME record.
Azure, a popular cloud service offer many services that can create such a d1. In this article, I will go details about services of Azure that can be vulnerable and how I exploited in the wild, including: Traffic Manager Profile, Web App, Virtual Machine
Traffic Manager profiles use traffic-routing methods to control the distribution of traffic to your cloud services or website endpoints.
My targets: Microsoft, Deloitte, HP
Normally, we can detect that a domain is using Traffic Manager if its CNAME record is xxx.trafficmanager.net like the following case.

The next step is checking whether the CNAME domain is available to register or not by using Azure API or using Azure portal.

If it is available, just create then in endpoint setting, select type External endpoint and enter your controlled IP address as the target. The final step is to create a PoC page in your server to make the PoC works.

Azure App Service enables you to build and host web apps, mobile back ends, and RESTful APIs in the programming language of your choice without managing infrastructure
My targets: Deloitte, US gov
In this case, the original domain points to xxx.azurewebsites.net

Similar to the Traffic Manager Profile, we have to check check the destination domain’s availability and if it’s available, create your own app. Then push whatever you want to it to prove that you can control the domain.



Note: I have reported that bug to the US Cert and they fixed afterwards.
Azure Linux Virtual Machines provides on-demand, high-scale, secure, virtualized infrastructure using Red Hat, Ubuntu, or the Linux distribution of your choice
My targets: BBC
Compare to those cases, the destination domain in this case includes the region name, its form is xxx.region_name.cloudapp.azure.com

Steps to exploit
North Europediscussions-stage.northeurope.cloudapp.azure.comdiscussions.stage.api.bbc.com


Reading Time: 17 minutesRead the English version Tóm tắt Bối cảnh Vào giữa tháng 01/2026, đội ngũ bảo mật của CyStack phát hiện […]

Reading Time: 7 minutesMở đầu Flash Loan Attack là một hình thức tấn công DeFi đã xuất hiện từ lâu, gây ra rất […]

Reading Time: 7 minutesRead the English version here Log4Shell hiện đang là một cơn ác mộng (có lẽ là tồi tệ nhất cho […]