CVE-2017-15091Incorrect Authorization in Authoritative

Severity
7.1HIGHNVD
EPSS
0.0%
top 99.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23
Latest updateMay 13

Description

An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:HExploitability: 2.8 | Impact: 4.2

Affected Packages3 packages

NVDpowerdns/authoritative3.03.4.11+1
CVEListV5powerdns/powerdns_authoritative3.x up to and including 3.4.11, 4.x up to and including 4.0.4+1
Debianopen-xchange/pdns< 4.0.5-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-c29m-p6xf-ppgw: An issue has been found in the API component of PowerDNS Authoritative 42022-05-13
CVEList
CVE-2017-15091: An issue has been found in the API component of PowerDNS Authoritative 42018-01-23
OSV
CVE-2017-15091: An issue has been found in the API component of PowerDNS Authoritative 42018-01-23

📋Vendor Advisories

1
Debian
CVE-2017-15091: pdns - An issue has been found in the API component of PowerDNS Authoritative 4.x up to...2017

💬Community

2
Bugzilla
CVE-2017-15091 pdns: Missing read-only check for API operations in ws-auth.cc can lead to denial of service2017-12-08
Bugzilla
CVE-2017-15091 pdns: Missing read-only check for API operations in ws-auth.cc can lead to denial of service [fedora-all]2017-12-08
CVE-2017-15091 — Incorrect Authorization | cvebase