Vulnerabilities > CVE-2017-15091 - Improperly Implemented Security Check for Standard vulnerability in Powerdns Authoritative

047910
CVSS 7.1 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
NONE
Integrity impact
LOW
Availability impact
HIGH
network
low complexity
powerdns
CWE-358
nessus

Summary

An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.

Nessus

  • NASL familyDNS
    NASL idPOWERDNS_AUTHORITATIVE_4_0_5.NASL
    descriptionAccording to its self-reported version number, the version of the PowerDNS Authoritative listening on the remote host is prior to 4.0.5. It is, therefore, affected by a vulnerability in the API where a remote authenticated attacker can perform operations that affect the server state even if the api-readonly configuration is enabled. Note that Nessus has not attempted to exploit these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id106192
    published2018-01-19
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106192
    titlePowerDNS Authoritative < 4.0.5 Read Only Configuration Bypass (CVE-2017-15091)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2017-1340.NASL
    descriptionThis update for pdns fixes the following issues : Security issue fixed : - CVE-2017-15091: An issue has been found in the API component of PowerDNS Authoritative, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only. This missing check allows an attacker with valid API credentials could flush the cache, trigger a zone transfer or send a NOTIFY (boo#1069242).
    last seen2020-06-05
    modified2017-12-14
    plugin id105230
    published2017-12-14
    reporterThis script is Copyright (C) 2017-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/105230
    titleopenSUSE Security Update : pdns (openSUSE-2017-1340)