Learn about CVE-2017-15093 affecting PowerDNS Recursor versions 4.x up to 4.0.6 and 3.x up to 3.7.4. Find out how unauthorized users can manipulate ACL and configure forward zones, leading to potential security risks.
PowerDNS Recursor versions 4.x up to 4.0.6 and 3.x up to 3.7.4 are vulnerable to unauthorized modification of Access Control List (ACL) and configuration of forward zones when api-config-dir is set to a non-empty value.
Understanding CVE-2017-15093
In this CVE, an authenticated user can manipulate the ACL and configure forward zones due to inadequate validation of netmask and IP addresses.
What is CVE-2017-15093?
PowerDNS Recursor versions 4.x up to 4.0.6 and 3.x up to 3.7.4 allow authorized users to modify ACL and configure forward zones when api-config-dir is set to a non-empty value. This can lead to injection of new configuration directives into the Recursor's configuration.
The Impact of CVE-2017-15093
The vulnerability enables authenticated users to manipulate ACL and configure forward zones, potentially leading to unauthorized access and configuration changes.
Technical Details of CVE-2017-15093
PowerDNS Recursor vulnerability details:
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from CVE-2017-15093 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates