PowerDNS Security Advisory 2020-04: Access restriction bypass¶
CVE: CVE-2020-14196
Date: July 1st 2020
Affects: PowerDNS Recursor up to and including 4.3.1, 4.2.2 and 4.1.16
Not affected: 4.3.2, 4.2.3, 4.1.17
Severity: Low
Impact: Access restriction bypass
Exploit: This problem can be triggered by sending HTTP queries
Risk of system compromise: No
Solution: Upgrade to a non-affected version
Workaround: Disable the webserver, set a password or an API key. Additionally, restrict the binding address using the webserver-address setting to local addresses only and/or use a firewall to disallow web requests from untrusted sources reaching the webserver listening address.
An issue has been found in PowerDNS Recursor where the ACL applied to the internal web server via webserver-allow-from is not properly enforced, allowing a remote attacker to send HTTP queries to the internal web server, bypassing the restriction.
In the default configuration the API webserver is not enabled. Only installations using a non-default value for webserver and webserver-address are affected.