4.3
CVSSv2

CVE-2020-14196

Published: 01/07/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue has been found in PowerDNS Recursor prior to 4.3.2 where the ACL applied to the internal web server via `webserver-allow-from` is not properly enforced, allowing a remote malicious user to send HTTP queries to the internal web server, bypassing the restriction. Note that the web server is not enabled by default. Only installations using a non-default value for `webserver` and `webserver-address` are affected. Workarounds are: disable the webserver or set a password or an API key. Additionally, restrict the binding address using the `webserver-address` setting to local addresses only and/or use a firewall to disallow web requests from untrusted sources reaching the webserver listening address.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns recursor

Vendor Advisories

Debian Bug report logs - #964103 pdns-recursor: CVE-2020-14196: Access restriction bypass Package: src:pdns-recursor; Maintainer for src:pdns-recursor is pdns-recursor packagers <pdns-recursor@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 1 Jul 2020 19:36:01 UTC Severity: imp ...
An issue has been found in PowerDNS Recursor before 432 where the ACL applied to the internal web server via `webserver-allow-from` is not properly enforced, allowing a remote attacker to send HTTP queries to the internal web server, bypassing the restriction Note that the web server is not enabled by default Only installations using a non-defa ...