Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
PowerDNS Recursor < 4.1.17, 4.2.0 < 4.2.3, 4.3.0 < 4.3.2 Access Restriction Bypass Vulnerability
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
PowerDNS Recursor is prone to an access restriction bypass vulnerability.
Insight
Insight
An issue has been found in PowerDNS Recursor where the ACL applied to the internal web server via webserver-allow-from is not properly enforced, allowing a remote attacker to send HTTP queries to the internal web server, bypassing the restriction. In the default configuration the API webserver is not enabled. Only installations using a non-default value for webserver and webserver-address are affected.
Affected Software
Affected Software
PowerDNS Recursor 4.1.16 and prior, 4.2.0 - 4.2.2 and 4.3.0 - 4.3.1.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 4.1.17, 4.2.3, 4.3.2 or later.