Stanford Web Security Research

Protecting Browsers from DNS Rebinding Attacks

DNS rebinding attacks subvert the same-origin policy and convert browsers into open network proxies. These attacks can

  • circumvent firewalls to access internal documents and services
  • require less than $100 to temporarily hijack 100,000 IP addresses for sending spam and defrauding pay-per-click advertisers

For information about defenses, please read our paper:

pdf
Protecting Browsers from DNS Rebinding Attacks   [BIBTEX]
In Proceedings of ACM CCS 07

Vulnerability Check

We are now checking your browser for DNS rebinding vulnerabilities.

Disclosure Timeline

Implementation

  • dnswall: daemon that filters out private IP addresses in DNS responses
  • prnetdb.c.patch: host name authorization check for Firefox

Related Work