Phase 2 — Active Recon

Date: 2026-04-26 Mode: Conservative (10 req/s, non-intrusive scripts only, no brute / DoS) Tools run: httpx (JSONL), dig (A/AAAA/CNAME), openssl x509 (SSL cert SAN harvest), curl (content discovery), Jira REST API /serverInfo, nmap top-1000 T2 (in progress)

What was tested

Hostname resolution summary

DNS observations

Tech fingerprinting highlights

Host Server Tech stack Notes
jira.corezoid.com Atlassian Jira 7.12.3 (2018-10-12) CRITICALCRZ-006
track.pre.corezoid.com kube-apiserver Kubernetes API (EKS pre-prod) HIGHCRZ-002
vpn.corezoid.com OpenVPN-AS OpenVPN Access Server Info — CRZ-005
doc.corezoid.com ESF Redirects to Google Doc Info — CRZ-004
widget.simulator.company nginx (default welcome) Low — CRZ-003
admin.corezoid.com nginx GA, HSTS Main admin UI
account.corezoid.com HSTS Auth / SSO
corezoid.com / www.corezoid.com / new.corezoid.com nginx Gatsby 2.13.65, React, Webpack Marketing site
api.corezoid.com nginx Gatsby 2.13.65, React Same Gatsby as marketing (unusual for API)
openapi.corezoid.com nginx Redoc (OpenAPI rendering) Reference docs only
book.corezoid.com AmazonS3 S3-hosted static site Public S3 bucket (expected)
market.corezoid.com nginx React, S3 Marketplace
simulator.company Next.js, React Marketing (Next)
sim.simulator.company HSTS Simulator UI
doc.simulator.company AmazonS3 Public S3 bucket Serves REST API docs

SPA catch-all routing observation

Multiple SPA-backed hosts return 200 OK with index.html for every path (including /.env, /.git/config, /actuator/env, /swagger.json, /.DS_Store). This is NOT a leaked file — it's the SPA fallback routing. However, it:

What's still running (background)

Findings filed in Phase 2

ID Severity Title
CRZ-001 Low RFC1918 IPs in public DNS (admin-pre)
CRZ-002 High Public Kubernetes API server (EKS pre-prod)
CRZ-003 Low Default nginx welcome on widget.simulator.company
CRZ-004 Info Public Google Doc as product docs
CRZ-005 Info OpenVPN-AS version fingerprint
CRZ-006 🔴 CRITICAL Jira Server 7.12.3 (2018) — unauth RCE (CVE-2019-11581 et al.)

Next phase

Phase 3 — Authenticated web app testing. HAR file replay on admin.corezoid.com and mw.simulator.company to probe IDOR, BOLA, authz bypass, stored XSS. Awaiting CTO go-ahead per phase-gated RoE.

Also awaiting CTO decision on CRZ-006 Jira critical — options:

  1. Confirm PoC of CVE-2019-11581 (low-impact canary) before filing final report
  2. Skip PoC, accept the version-disclosure finding as sufficient evidence, file report as-is
  3. Immediate patch / offline Jira — skip further testing and remediate first