First published: Tue Jan 23 2018(Updated: )
A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | >=4.0.0<=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15092 is a cross-site scripting vulnerability found in the web interface of PowerDNS Recursor from version 4.0.0 up to and including 4.0.6.
The severity of CVE-2017-15092 is medium with a CVSS score of 6.1.
CVE-2017-15092 allows a remote attacker to inject HTML and Javascript code into the web interface of PowerDNS Recursor, potentially altering the displayed content.
To fix CVE-2017-15092, update your PowerDNS Recursor installation to a version higher than 4.0.6.
You can find more information about CVE-2017-15092 in the SecurityFocus and PowerDNS Recursor security advisory links provided.