{"id":"CVE-2020-14196","details":"In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.","modified":"2026-04-11T21:47:54.593183Z","published":"2020-07-01T18:15:10.980Z","related":["MGASA-2020-0286","openSUSE-SU-2020:1005-1","openSUSE-SU-2020:1055-1","openSUSE-SU-2020:1101-1","openSUSE-SU-2020:1687-1","openSUSE-SU-2024:11157-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html"},{"type":"ADVISORY","url":"https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2020/07/01/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"0"},{"last_affected":"aeba5fdaad53465e43c7047ff49629d617b83420"},{"introduced":"2e63a37703ddea61f037c312341d364224130e16"},{"last_affected":"130c3986cee3d79e08672333a0706fc795381513"},{"introduced":"f8e019026f5a1eff4b56a90a39c4acac95ae9dc4"},{"last_affected":"474236432a3b497e2729178673a48a2b60ee4876"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.1.16"},{"introduced":"4.2.0"},{"last_affected":"4.2.2"},{"introduced":"4.3.0"},{"last_affected":"4.3.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*"}}],"versions":["auth-3.1-rc1","auth-3.1-rc2","auth-3.1-rc3","auth-3.2-rc1","auth-3.2-rc2","auth-3.2-rc3","auth-3.2-rc4","auth-3.4.0","auth-3.4.0-rc1","auth-3.4.0-rc2","auth-4.0.0","auth-4.0.0-alpha1","auth-4.0.0-alpha2","auth-4.0.0-alpha3","auth-4.0.0-beta1","auth-4.0.0-rc1","auth-4.0.0-rc2","auth-4.0.1","auth-4.1.0","auth-4.1.0-rc1","auth-4.1.0-rc2","auth-4.1.0-rc3","dnsdist-1.0.0","dnsdist-1.0.0-alpha1","dnsdist-1.0.0-alpha2","dnsdist-1.0.0-beta1","dnsdist-1.1.0","dnsdist-1.1.0-beta1","dnsdist-1.1.0-beta2","dnsdist-1.2.0","rec-3-0","rec-3-0-1","rec-3.0","rec-3.0.1","rec-3.1.4","rec-3.3.1","rec-3.5","rec-3.5-rc1","rec-3.5-rc3","rec-3.5-rc4","rec-3.5-rc5","rec-3.6.0","rec-4.0.0","rec-4.0.0-alpha1","rec-4.0.0-alpha2","rec-4.0.0-alpha3","rec-4.0.0-beta1","rec-4.0.0-rc1","rec-4.0.1","rec-4.0.2","rec-4.1.0","rec-4.1.0-alpha1","rec-4.1.0-rc1","rec-4.1.0-rc2","rec-4.1.0-rc3","rec-4.1.1","rec-4.1.10","rec-4.1.11","rec-4.1.12","rec-4.1.13","rec-4.1.14","rec-4.1.15","rec-4.1.16","rec-4.1.2","rec-4.1.3","rec-4.1.4","rec-4.1.5","rec-4.1.6","rec-4.1.7","rec-4.1.8","rec-4.1.9","rec-4.2.0","rec-4.2.1","rec-4.2.2","rec-4.3.0","rec-4.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14196.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}