Twenty Year Anniversary

eNom Inter-Account Transfer Issue

eNom Inter-Account Transfer Issue
Posted Sep 4, 2017
Authored by Joseph Harris

eNom appears to not check for any confirmation from owners when performing domain transfers.

tags | exploit, bypass
MD5 | 70095f8716910559984cb06ad2ccab0d

eNom Inter-Account Transfer Issue

Change Mirror Download
the m group security advisory [2017090100]:
Zero-confirmation inter-account transfers of .uk domains with eNom

* Discovery date: 2017-05-02
* Publish date: 2017-09-01 (+122 days)
* Product:, the website for eNom Inc. and their
APIs, all eNom resellers
* Vulnerable: yes, as of publication date 2017-09-01
* Impact: critical
* Homepage:
* Errata by: the m group, Sydney office, <>
* Reported by: the m group
* URL:

Vendor description

eNom is one of the world's largest domain registrars holding over 15
million domain names as well as offering a host of domain and hosting
related services. eNom are also a large internet reseller, powering at
least part of the domain name registration systems for many registrars
including NameCheap.


eNom were recently acquired by Tucows.

Vulnerability & description

eNom allows zero-confirmation .uk domain transfers between reseller
accounts. This bypasses all account security and usual domain transfer
authorization. Combined with instant IPS tag changes at Nominet, the .uk
regional registrar, .uk domains can be hijacked within minutes and
placed into a state where only a manual access restoration procedure
with Nominet can recover the domains.

This vulnerability is accessible to and impacts anyone with an eNom
account or anyone with an account with an eNom reseller which provides
automated domain transfers.

The vulnerability is within eNom's .uk transfer system and impacts .uk
domains only. It does not impact second level .??.uk domains such as and

Steps to reproduce

1. Open an account with eNom or with an eNom reseller with integrates
with eNom over their APIs, for example NameCheap.
2. Identify a .uk domain managed by eNom. Any .uk domain with an IPS tag
set to ENOM is vulnerable.
3. Issue an inbound transfer request from the reseller.
4. Within a few minutes the .uk domain will "successfully complete"
transfer to your reseller account with no notice given to the original
owner and no confirmation of any kind required.
5. (optional) Immediately transfer the domain elsewhere by changing the
IPS tag and registrant email address making the domain extremely
difficult if not impossible to recover without a manual intervention by


Confirmed with domain hijacking between NameCheap and eNom using test
domains. The eNom platform and all eNom resellers are assumed to be


This vulnerability is with a remote hosted platform there is no
available local solution until eNom resolve the security issue.


Transfer all .uk domains away from eNom. Any .uk domains with the IPS
tag set to ENOM should be transferred away from eNom immediately.

NOTE: during our own domain migrations away from eNom it was discovered
that eNom to not update .uk contact details in certain instances in
their own control panel. This can cause domains to appear to have valid
registrant contact email addresses but they actually have incorrect
details stored at Nominet. Domains which have their IPS tags changed to
push them away from eNom can then be left in a permanently locked and
useless state as authorisation emails sent to invalid registrant contact
addresses can never be authorized.

It is critical that registrant contact details be force-updated from
eNom's control panel before you change the IPS tags even if the contact
details look correct or you may be required to manually contact Nominet
(and pay a fee) to restore your domain. You can verify your .uk
registrant contact details directly with Nominet by opening a Nominet
Online Services account for free.

Vendor contact timeline

Extensive, see the full summary for details.

2017-05-02 (initial report)
2017-05-02 to 2017-08-29 - Significant contact with multiple eNom
2017-09-01 (+122 days) - Errata made public.


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    2 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By