Home / Companies / GitHub / Blog / Post Details
Content Deep Dive

DNS rebinding attacks explained: The lookup is coming from inside the house!

Blog post from GitHub

Post Details
Company
Date Published
Author
Jaroslav Lobacevski
Word Count
1,735
Language
English
Hacker News Points
-
Summary

DNS rebinding attacks exploit a browser's handling of domain name resolution to bypass the same-origin policy, facilitating unauthorized access to local applications. This technique manipulates how browsers resolve IP addresses, allowing attackers to redirect requests intended for a legitimate domain to a local IP address, thus treating them as originating from the same source. The text illustrates this through a vulnerability in the Deluge BitTorrent client, where DNS rebinding could enable attackers to read arbitrary files from a local system. While browsers attempt to mitigate such threats through DNS caching and new specifications like CORS-RFC1918, these defenses have limitations and can be bypassed, especially on certain operating systems. Effective countermeasures include enforcing strong authentication, using HTTPS, validating Host headers, and incorporating DNS rebinding into security threat models to safeguard local applications from being exposed through vulnerable browser behavior.