Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Heroku Takeover Detection

By kannthu

High
Vidoc logoVidoc Module
#takeover#heroku
Description

What is the "Heroku Takeover Detection?"

The "Heroku Takeover Detection" module is designed to detect potential takeover vulnerabilities in applications hosted on the Heroku platform. Heroku is a cloud platform that allows developers to deploy, manage, and scale their applications easily. This module focuses on identifying misconfigurations or vulnerabilities that could potentially lead to a takeover of the Heroku application.

This module has a severity level of high, indicating that the identified vulnerabilities or misconfigurations can have a significant impact on the security and functionality of the application.

The original author of this module is 0xPrial and pdteam.

Impact

If a takeover vulnerability is present in a Heroku application, an attacker may be able to gain unauthorized access, manipulate data, or disrupt the application's functionality. This can lead to potential data breaches, unauthorized actions, or service disruptions, depending on the specific nature of the vulnerability.

How does the module work?

The "Heroku Takeover Detection" module works by analyzing the responses received from the target application and comparing them against predefined matching conditions. It uses a set of matchers to identify specific patterns or indicators that suggest a potential takeover vulnerability.

One of the matching conditions used by this module is to check if the response contains the HTML code "<title>No such app</title>". This indicates that the application may be displaying an error page for a non-existent app, which could be a sign of a takeover vulnerability.

The module also checks if the response does not contain the host IP address, which helps to filter out false positives and focus on potential takeover scenarios.

By combining these matching conditions, the module can identify potential takeover vulnerabilities in Heroku applications.

Here is an example of an HTTP request that the module might send:

GET / HTTP/1.1
Host: example.com
User-Agent: Vidoc/1.0
Accept: */*

This request is sent to the target application to gather information and analyze the response for potential takeover indicators.

It's important to note that this module is just one test case within the Vidoc platform, which utilizes multiple modules to perform comprehensive scanning and detection of various vulnerabilities, misconfigurations, and software fingerprints.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: herokucdn.com/error-pages/no-such-app.ht...
On match action
Report vulnerability