0

Cross-Site Request Forgery vulnerability found at GoDaddy

GoDaddy, the domain registrar giants, have been identified as being vulnerable to a cross-site request forgery vulnerability. The vulnerability, identified by a New York based web application security researcher, would allow a malicious user to hijack websites registered with the company and could have led to disastrous impacts if it had not been addressed straight away. GoDaddy have obviously recognized this and since released a patch to fix the vulnerability, less than 24 hours after its identification. The security researcher identified the bug and informed GoDaddy that the vulnerability was applicable across most of GoDaddy’s DNS management services.
So, what is a cross-site request forgery attack? Well, a cross-site request forgery attack, otherwise known as CSRF, is an attack that occurs when malicious code in a website, blog, email or message forces a user’s web browser to perform an unwanted action or request. This usually occurs when a user is authenticated to that website or service. This can range from transferring funds from a bank account when logged in to online banking to altering records on social media sites. The purpose is to allow the attacker to perform an action from the user s browser without the knowledge of the user. Check out the video below for further information.

In the case of GoDaddy, the attackers could have utilised this web application vulnerability to change DNS settings, change account holder details of domain names or even hijack the domain to ransom. The attackers do not even need to know details about the account, rather just the domain name of the DNS records in order to change or alter account details.
While GoDaddy have issued a patch to rectify the problem, the domain registrars have not released any public statement to confirm or deny that user accounts may have been compromised.
Filed in: News Tags: , ,

Get Updates

Share This Post

Recent Posts

Leave a Reply

Submit Comment

© 2017 Cyber Security News. All rights reserved.