PowerDNS Security Advisory 2017-05: Cross-Site Scripting in the web interface¶
CVE: CVE-2017-15092
Date: November 27th 2017
Credit: Nixu, Chris Navarrete of Fortinet’s Fortiguard Labs
Affects: PowerDNS Recursor from 4.0.0 up to and including 4.0.6
Not affected: PowerDNS Recursor 4.0.7, 3.7.x
Severity: Medium
Impact: Alteration and denial of service of the web interface
Exploit: This problem can be triggered by an attacker sending DNS queries to the server
Risk of system compromise: No
Solution: Upgrade to a non-affected version
An issue has been found in the web interface of PowerDNS Recursor, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and JavaScript code into the web interface, altering the content. This issue has been assigned CVE-2017-15092.
PowerDNS Recursor from 4.0.0 up to and including 4.0.6 are affected.
For those unable to upgrade to a new version, a minimal patch is available
We would like to thank Nixu and Chris Navarrete of Fortinet’s Fortiguard Labs for independently finding and reporting this issue.