[Security] Mitigate DNS rebinding flaw
See original GitHub issueMitigate the WebTorrent DNS rebinding flaw disclosed in HackerOne. Low security/privacy risk.
Original issue: https://github.com/brave/browser-laptop/issues/12616 Original Brave PR: https://github.com/brave/browser-laptop/pull/13844 Original WebTorrent PR: https://github.com/webtorrent/webtorrent/pull/1260 Fixed WebTorrent PR: https://github.com/webtorrent/webtorrent/pull/1678
The fix is already published in webtorrent@0.105.2
. We should update to this version.
Issue Analytics
- State:
- Created 4 years ago
- Comments:5 (3 by maintainers)
Top Results From Across the Web
DNS Rebinding Attack: How Malicious Websites ... - Unit 42
DNS rebinding allows attackers to take advantage of web-based consoles to exploit internal networks by abusing the domain name system.
Read more >DNS rebinding - Wikipedia
DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this...
Read more >Practical Protection Against DNS Rebinding Attacks
A DNS rebinding attack that exploits a local service shows that the domain name is pointing to a loopback address. Similarly, if it's...
Read more >Protecting Browsers from DNS Rebinding Attacks
Firmware patches have attempted to secure routers against cross-site scripting and cross-site request forgery, in an effort to prevent recon- figuration attacks ...
Read more >Defending Networks Against DNS Rebinding Attacks - CircleID
Using DNS rebinding, an attacker can circumvent firewalls to spider corporate Intranets, exfiltrate sensitive documents, and compromise unpatched internal ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Talked to @GeetaSarvadnya through DM about testing on Windows, note here for future references. On Windows, we could install
nmap
from https://nmap.org/ncat/ which includesncat
. When testing, change to the installation folder, such asc\Program Files (x86)\Nmap
, and runcat <(echo -en 'GET / HTTP/1.1\r\nHost: attacker.com\r\n\r\n') - | ./ncat.exe localhost 49976
(Replace port with the result of previous step.) This command is tested using MINGW64, might need a little tweak if you are using other tools.Verification PASSED on
macOS 10.14.6 x64
using the following build:Verification passed on
Verification passed on