First published: Tue Jan 23 2018(Updated: )
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Authoritative | >=3.0<=3.4.11 | |
PowerDNS Authoritative | >=4.0.0<=4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15091 is an issue found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11.
The severity of CVE-2017-15091 is high, with a severity value of 7.1.
CVE-2017-15091 allows some operations that impact the state of the server to be allowed even when the API is configured as read-only.
To fix CVE-2017-15091, it is recommended to upgrade PowerDNS Authoritative to version 3.4.12 or higher for 3.x, and version 4.0.5 or higher for 4.x.
More information about CVE-2017-15091 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/101982) and [PowerDNS Advisory](https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2017-04.html).