A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101982 | Third Party Advisory VDB Entry |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/101982 | Third Party Advisory VDB Entry |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101982 - Third Party Advisory, VDB Entry | |
References | () https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html - Patch, Vendor Advisory |
Information
Published : 2018-01-23 15:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15092
Mitre link : CVE-2017-15092
CVE.ORG link : CVE-2017-15092
JSON object : View
Products Affected
powerdns
- recursor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')