Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Wix Takeover Detection

By kannthu

High
Vidoc logoVidoc Module
#takeover#wix
Description

What is the "Wix Takeover Detection" module?

The "Wix Takeover Detection" module is designed to detect potential takeover vulnerabilities in websites built using the Wix platform. It targets specific misconfigurations or vulnerabilities that could allow an attacker to gain unauthorized access or control over the website.

This module has a severity level of high, indicating that the detected vulnerabilities could have a significant impact on the security and functionality of the affected website.

This module was authored by harshinsecurity and philippedelteil.

Impact

If a takeover vulnerability is successfully exploited, an attacker could gain control over the affected website. This could lead to unauthorized access, data breaches, defacement, or other malicious activities.

How does the module work?

The "Wix Takeover Detection" module works by analyzing the responses received from the target website and matching them against predefined conditions. It uses a combination of DSL (Domain Specific Language) and word-based matching to identify potential vulnerabilities.

One of the matching conditions used by this module is to check if the host is not an IP address, which helps filter out false positives. It also looks for specific error messages, such as "Error ConnectYourDomain occurred" and "wixErrorPagesApp", which could indicate misconfigurations or vulnerabilities in the Wix platform.

Additionally, the module checks if the HTTP response status code is 404 (Not Found), which suggests that the website may be vulnerable to takeover attempts.

By analyzing these conditions, the module can identify potential takeover vulnerabilities in Wix websites.

Here is an example of an HTTP request that the module might send:

GET / HTTP/1.1
Host: example.com
User-Agent: Vidoc-Scanner/1.0
Accept: */*

The module then evaluates the response received from the target website based on the defined matching conditions to determine if a potential takeover vulnerability exists.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: Error ConnectYourDomain occurred, wixErr...and
status: 404
On match action
Report vulnerability