CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action

Variant Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.

常见后果

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity Bypass Protection Mechanism

说明: Malicious users can fake authentication information by providing false DNS information.

潜在缓解措施

阶段: Architecture and Design

描述: Use other means of identity verification that cannot be simply spoofed. Possibilities include a username/password or certificate.

阶段: Implementation

描述: Perform proper forward and reverse DNS lookups to detect DNS spoofing.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2001-1488

Does not do double-reverse lookup to prevent DNS spoofing.

参考: CVE-2001-1500

Does not verify reverse-resolved hostnames in DNS.

参考: CVE-2000-1221

Authentication bypass using spoofed reverse-resolved DNS hostnames.

参考: CVE-2002-0804

Authentication bypass using spoofed reverse-resolved DNS hostnames.

参考: CVE-2001-1155

Filter does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.

参考: CVE-2004-0892

Reverse DNS lookup used to spoof trusted content in intermediary.

参考: CVE-2003-0981

Product records the reverse DNS name of a visitor in the logs, allowing spoofing and resultant XSS.

引入模式

阶段 说明
Architecture and Design -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Improperly Trusted Reverse DNS -
CLASP - Trusting self-reported DNS name -
Software Fault Patterns SFP29 Faulty endpoint authentication -
关键信息

CWE ID: CWE-350

抽象级别: Variant

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-142 CAPEC-275 CAPEC-73 CAPEC-89