Name | CVE-2017-15092 |
Description | A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
pdns-recursor (PTS) | bullseye | 4.4.2-3 | fixed |
bookworm, bookworm (security) | 4.8.8-1 | fixed | |
sid, trixie | 5.0.7-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
pdns-recursor | source | wheezy | (not affected) | |||
pdns-recursor | source | jessie | (not affected) | |||
pdns-recursor | source | stretch | 4.0.4-1+deb9u2 | |||
pdns-recursor | source | (unstable) | 4.0.7-1 |
[jessie] - pdns-recursor <not-affected> (Issue introduced in 4.0.0)
[wheezy] - pdns-recursor <not-affected> (Issue introduced in 4.0.0)
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html
https://downloads.powerdns.com/patches/2017-05/