CWE-350
Reliance on Reverse DNS Resolution for a Security-Critical Action
The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.
CVE-2025-59163 (GCVE-0-2025-59163)
Vulnerability from cvelistv5
- CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action
▼ | URL | Tags |
---|---|---|
https://github.com/safedep/vet/security/advisories/GHSA-6q9c-m9fr-865m | x_refsource_CONFIRM | |
https://github.com/safedep/vet/commit/0ae3560ba11846375812377299fe078d45cc3d48 | x_refsource_MISC | |
https://github.com/safedep/vet/releases/tag/v1.12.5 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59163", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T14:49:16.371928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T14:49:25.166Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vet", "vendor": "safedep", "versions": [ { "status": "affected", "version": "\u003c 1.12.5" } ] } ], "descriptions": [ { "lang": "en", "value": "vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 2.1, "baseSeverity": "LOW", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-350", "description": "CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-29T21:51:31.243Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/safedep/vet/security/advisories/GHSA-6q9c-m9fr-865m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/safedep/vet/security/advisories/GHSA-6q9c-m9fr-865m" }, { "name": "https://github.com/safedep/vet/commit/0ae3560ba11846375812377299fe078d45cc3d48", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/safedep/vet/commit/0ae3560ba11846375812377299fe078d45cc3d48" }, { "name": "https://github.com/safedep/vet/releases/tag/v1.12.5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/safedep/vet/releases/tag/v1.12.5" } ], "source": { "advisory": "GHSA-6q9c-m9fr-865m", "discovery": "UNKNOWN" }, "title": "vet MCP Server SSE Transport DNS Rebinding Vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-59163", "datePublished": "2025-09-29T21:51:31.243Z", "dateReserved": "2025-09-09T15:23:16.328Z", "dateUpdated": "2025-09-30T14:49:25.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59956 (GCVE-0-2025-59956)
Vulnerability from cvelistv5
- CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action
▼ | URL | Tags |
---|---|---|
https://github.com/coder/agentapi/security/advisories/GHSA-w64r-2g3w-w8w4 | x_refsource_CONFIRM | |
https://github.com/coder/agentapi/pull/49 | x_refsource_MISC | |
https://github.com/coder/agentapi/commit/5c425c62447b8a9eac19e9fc5a2eae7f0803f149 | x_refsource_MISC | |
https://github.blog/security/application-security/localhost-dangers-cors-and-dns-rebinding | x_refsource_MISC | |
https://github.com/coder/agentapi/releases/tag/v0.4.0 | x_refsource_MISC | |
https://mcpsec.dev/advisories/2025-09-19-coder-chat-exfiltration | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59956", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-30T14:14:39.407205Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-30T14:14:53.214Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://mcpsec.dev/advisories/2025-09-19-coder-chat-exfiltration/" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "agentapi", "vendor": "coder", "versions": [ { "status": "affected", "version": "\u003c 0.4.0" } ] } ], "descriptions": [ { "lang": "en", "value": "AgentAPI is an HTTP API for Claude Code, Goose, Aider, Gemini, Amp, and Codex. Versions 0.3.3 and below are susceptible to a client-side DNS rebinding attack when hosted over plain HTTP on localhost. An attacker can gain access to the /messages endpoint served by the Agent API. This allows for the unauthorized exfiltration of sensitive user data, specifically local message history, which can include secret keys, file system contents, and intellectual property the user was working on locally. This issue is fixed in version 0.4.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-350", "description": "CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-29T23:57:08.133Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/coder/agentapi/security/advisories/GHSA-w64r-2g3w-w8w4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/coder/agentapi/security/advisories/GHSA-w64r-2g3w-w8w4" }, { "name": "https://github.com/coder/agentapi/pull/49", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/coder/agentapi/pull/49" }, { "name": "https://github.com/coder/agentapi/commit/5c425c62447b8a9eac19e9fc5a2eae7f0803f149", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/coder/agentapi/commit/5c425c62447b8a9eac19e9fc5a2eae7f0803f149" }, { "name": "https://github.blog/security/application-security/localhost-dangers-cors-and-dns-rebinding", "tags": [ "x_refsource_MISC" ], "url": "https://github.blog/security/application-security/localhost-dangers-cors-and-dns-rebinding" }, { "name": "https://github.com/coder/agentapi/releases/tag/v0.4.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/coder/agentapi/releases/tag/v0.4.0" }, { "name": "https://mcpsec.dev/advisories/2025-09-19-coder-chat-exfiltration", "tags": [ "x_refsource_MISC" ], "url": "https://mcpsec.dev/advisories/2025-09-19-coder-chat-exfiltration" } ], "source": { "advisory": "GHSA-w64r-2g3w-w8w4", "discovery": "UNKNOWN" }, "title": "AgentAPI exposed user chat history via a DNS rebinding attack" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-59956", "datePublished": "2025-09-29T23:57:08.133Z", "dateReserved": "2025-09-23T14:33:49.506Z", "dateUpdated": "2025-09-30T14:14:53.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Use other means of identity verification that cannot be simply spoofed. Possibilities include a username/password or certificate.
Mitigation ID: MIT-42
Phase: Implementation
Description:
- Perform proper forward and reverse DNS lookups to detect DNS spoofing.
CAPEC-142: DNS Cache Poisoning
A domain name server translates a domain name (such as www.example.com) into an IP address that Internet hosts use to contact Internet resources. An adversary modifies a public DNS cache to cause certain names to resolve to incorrect addresses that the adversary specifies. The result is that client applications that rely upon the targeted cache for domain name resolution will be directed not to the actual address of the specified domain name but to some other address. Adversaries can use this to herd clients to sites that install malware on the victim's computer or to masquerade as part of a Pharming attack.
CAPEC-275: DNS Rebinding
An adversary serves content whose IP address is resolved by a DNS server that the adversary controls. After initial contact by a web browser (or similar client), the adversary changes the IP address to which its name resolves, to an address within the target organization that is not publicly accessible. This allows the web browser to examine this internal address on behalf of the adversary.
CAPEC-73: User-Controlled Filename
An attack of this type involves an adversary inserting malicious characters (such as a XSS redirection) into a filename, directly or indirectly that is then used by the target software to generate HTML text or other potentially executable content. Many websites rely on user-generated content and dynamically build resources like files, filenames, and URL links directly from user supplied data. In this attack pattern, the attacker uploads code that can execute in the client browser and/or redirect the client browser to a site that the attacker owns. All XSS attack payload variants can be used to pass and exploit these vulnerabilities.
CAPEC-89: Pharming
A pharming attack occurs when the victim is fooled into entering sensitive data into supposedly trusted locations, such as an online bank site or a trading platform. An attacker can impersonate these supposedly trusted sites and have the victim be directed to their site rather than the originally intended one. Pharming does not require script injection or clicking on malicious links for the attack to succeed.