...
This action effectively bypasses the same-origin policy (SOP) restrictions within the victim's browser, allowing the attacker to execute harmful actions like stealing sensitive data, disrupting business operations, or setting the stage for more extensive attacks. To combat such threats, enabling specific security settings can prevent DNS rebinding attacks. It's important to remember that DNS rebinding exploits the inherent trust browsers place in the Domain Name System, posing serious security risks if not addressed effectively.
Any public DNS request reaching BloxOne Cloud that resolves to a private IP address, could be a sign of a DNS rebinding attack. If the option - "Block DNS Rebinding attacks" is enabled, Infoblox BloxOne Cloud would respond with "No Error - No Data" response for such DNS requests. In this scenario, Infoblox removes the private IP addresses from the responses. This may result in a NODATA response if there are no other records included in the response.