Blind SSRF via DNS rebinding is a technique where an attacker leverages a server’s backend URL-fetching functionality and uses DNS tricks to pivot into internal systems. The DNS rebinding part works by resolving an attacker-controlled domain (e.g., payload.rbndr.us
) to a public IP on the first lookup, and then switching to an internal IP (e.g., 127.0.0.1
or 192.168.x.x
) once the DNS cache expires. This bypasses network-layer protections like IP whitelisting or NAT boundaries.
The "blind" part refers to the lack of direct response from the vulnerable server. The attacker infers internal access by monitoring side channels — such as response timing, status codes, or connection failures.
In this case, while testing the endpoint https://api.target.com/vendor/v3/external_registry
, I supplied a rebinding payload in the endpoint
parameter and used timing analysis to enumerate internal IPs. The results indicated the server made backend requests and likely resolved internal addresses.
https://api.target.com/vendor/v3/external_registry
7f000001.ac14000a.rbndr.us
endpoint
parameter of the POST body.192.168.0.1
through 192.168.0.153
.response timings
rebinding payloads
This vulnerability allowed internal IP enumeration via DNS rebinding and blind SSRF behavior. Although no response data was leaked, the ability to interact with internal infrastructure is a stepping stone to more serious attacks — especially when combined with metadata service access or open ports on internal services.