An attacker might be able to inject HTML content into the internal web dashboard by sending crafted DNS queries to a DNSdist instance where domain-based dynamic rules have been enabled via either DynBlockRulesGroup:setSuffixMatchRule or DynBlockRulesGroup:setSuffixMatchRuleFFI.
| Vendor | Product | Versions |
|---|---|---|
| PowerDNS | DNSdist | 1.9.0, 2.0.0 |
Updated affected versions to include 1.9.11 and 2.0.2, changed severity to MEDIUM, and noted that no exploit exists.
Added CWE-79, marked exploit as available, and noted that the vulnerability is actively exploited.
Initial creation