[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Trusting Self-reported DNS Name

ID: 292Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Variant





Description

The use of self-reported DNS names as authentication is flawed and can easily be spoofed by malicious users.

Likelihood of Exploit: High

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Gain privileges / assume identity
 
Malicious users can fake authentication information by providing false DNS information.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 Use other means of identity verification that cannot be simply spoofed. Possibilities include a username/password or certificate.
 
  
Implementation
 
 Perform proper forward and reverse DNS lookups to detect DNS spoofing.
 
  

Relationships

Related CWETypeViewChain
CWE-292 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples   (Details)

  1. In these examples, a connection is established if a request is made by a trusted host.
  2. The following code samples use a DNS lookup in order to decide whether or not an inbound request is from a trusted host. If an attacker can poison the DNS cache, they can gain trusted status. (Demonstrative Example Id DX-93)

Observed Examples

  1. CVE-2009-1048 : VOIP product allows authentication bypass using 127.0.0.1 in the Host header.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
CLASP  Trusting self-reported DNS name
 
 

References:
None

© SecPod Technologies