Source |
Fortinet |
Identifiant |
443277 |
Date de publication |
2017-12-02 15:50:59 (vue: 2017-12-02 15:50:59) |
Titre |
PowerDNS Recursor HTML/Script Injection Vulnerability – A Walkthrough |
Texte |
PowerDNS Recursor is a high-end, high-performance resolving name server that powers the DNS resolution of at least a hundred million subscribers. The “Recursor†is one of two name server products whose primary goal is to act as resolving DNS server. On Aug. 7, 2017, I reported an XSS (cross-site scripting) vulnerability to PowerDNS and its Security Team. They assigned it the identifier CVE-2017-15092. In this report I will explain how I was able to identify and trigger the vulnerability. |
Notes |
|
Envoyé |
Oui |
Condensat |
15092 2017 able act assigned aug cross cve dns end explain goal high how html/script hundred identifier identify injection its least million name one performance powerdns powers primary products recursor report reported resolution resolving scripting security server site subscribers team trigger two vulnerability walkthrough whose will xss “recursor†|
Tags |
|
Stories |
|
Move |
|