SOP Bypass
Setting & Methodology
Attack Scenario
Attack Chain
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β DNS Rebinding Attack Flow β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β β
β 1. Attacker configures attacker.htb β 9.9.9.9 (attacker server) β
β β
β 2. Victim visits http://attacker.htb β
β βββ DNS resolves to 9.9.9.9 β
β βββ Malicious JavaScript payload loaded β
β β
β 3. Attacker rebinds DNS: attacker.htb β 192.168.178.1 β
β β
β 4. JavaScript makes GET request to http://attacker.htb/secret β
β βββ DNS now resolves to 192.168.178.1 (internal app) β
β βββ Same origin (scheme, host, port) β No SOP violation! β
β βββ JavaScript can access the response β
β β
β 5. Payload exfiltrates response to http://exfiltrate.attacker.htb β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββExploitation
Internal Web Application (Target)
Start DNS Rebinding Server
Malicious JavaScript Payload
Start Exfiltration Server
Results
Restrictions
Authentication Protection
DNS Caching
Local Network Access (WC3 Draft Specification - 2023)
Header
Purpose
Last updated