7.7 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
CoreDNS ACL Bypass
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
References
-
https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr x_refsource_CONFIRM
-
https://github.com/coredns/coredns/releases/tag/v1.14.2 x_refsource_MISC
Affected products
- ==< 1.14.2
Package maintainers
-
@DeltaEvo Duarte David <deltaduartedavid@gmail.com>
-
@rtreffer Rene Treffer <treffer+nixos@measite.de>
-
@rushmorem Rushmore Mushambi <rushmore@webenchanter.com>