Information Disclosure: DNS Rebinding Attack¶
Identifier:
dns_rebinding_attack
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
DNS rebinding attacks can occur when DNS responses contain private IPv4 or IPv6 addresses, potentially allowing attackers to redirect users to malicious websites or access internal resources.
How we test: We test for DNS rebinding vulnerabilities by checking if DNS responses contain private IP addresses. We analyze DNS records to detect if they are vulnerable to rebinding attacks that could allow unauthorized access to internal resources.
Reference:
- https://capec.mitre.org/data/definitions/275.html
- https://payatu.com/blog/dns-rebinding/
- https://heimdalsecurity.com/blog/dns-rebinding/
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.