mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
69 lines
2.0 KiB
JSON
69 lines
2.0 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "secalert@redhat.com",
|
|
"DATE_PUBLIC" : "2017-11-27T00:00:00",
|
|
"ID" : "CVE-2017-15092",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "PowerDNS Recursor",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "from 4.0.0 up to and including 4.0.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "PowerDNS"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html"
|
|
},
|
|
{
|
|
"name" : "101982",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/101982"
|
|
}
|
|
]
|
|
}
|
|
}
|