This vulnerability occurs when an application uses a reverse DNS lookup on an IP address to get a hostname and then uses that hostname for a security decision—like access control or logging—without verifying that the IP address actually belongs to that hostname.
Relying on a reverse DNS (rDNS) hostname for authentication or security decisions is inherently risky because DNS records are not a secure proof of identity. An attacker who controls the DNS server for their IP address can make it return any hostname they choose, such as 'trusted-server.internal,' potentially bypassing IP allowlists, spoofing logs, or gaining unauthorized access. Attackers can spoof these names either by compromising a legitimate DNS server (via methods like cache poisoning) or by legitimately managing the DNS for their own infrastructure. Since applications cannot easily distinguish between a legitimate rDNS response and a spoofed one, using this data for security-critical actions creates a significant weakness that can be exploited to hide malicious activity or impersonate trusted systems.
Impact: Gain Privileges or Assume IdentityBypass Protection Mechanism
Malicious users can fake authentication information by providing false DNS information.
cjavac#cjava