[Security] pingrelay: DNS rebinding bypass in forward_url validation #32
Labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
ash/ideas#32
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Architectural Concern
pingrelay validates forward URLs at create time but DNS resolution happens at forward time. An attacker could:
https://attacker.com/hook(passes validation)127.0.0.1Recommendation
Use a custom
DialContextin the HTTP client that resolves DNS and checks the IP againstisBlockedIP()before connecting.Severity
Medium — requires DNS control but well-known SSRF pattern.
Found during red team audit 2026-02-28.