CVE-2022-30256Operation on a Resource after Expiration or Release in Maradns

Severity
7.5HIGHNVD
EPSS
0.8%
top 26.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 19
Latest updateAug 3

Description

An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/maradns< maradns 2.0.13-1.4+deb11u1 (bullseye)
NVDmaradns/maradns3.5.03.5.0022+1
Debianmaradns/maradns< 2.0.13-1.4+deb11u1
Ubuntumaradns/maradns< 2.0.13-1.4+deb11u1build0.20.04.1+3

🔴Vulnerability Details

3
OSV
maradns vulnerabilities2023-08-03
GHSA
GHSA-qqpw-wxfv-vfcg: An issue was discovered in MaraDNS Deadwood through 32022-11-19
OSV
CVE-2022-30256: An issue was discovered in MaraDNS Deadwood through 32022-11-19

💥Exploits & PoCs

1
Exploit-DB
Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)2023-05-23

📋Vendor Advisories

2
Ubuntu
MaraDNS vulnerabilities2023-08-03
Debian
CVE-2022-30256: maradns - An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant...2022
CVE-2022-30256 — Maradns vulnerability | cvebase