Insufficient Session Expiration Affecting unbound package, versions [,1.16.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-UNBOUND-2977895
  • published10 Aug 2022
  • disclosed1 Aug 2022
  • creditXiang Li (Tsinghua University)

Introduced: 1 Aug 2022

CVE-2022-30699  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade unbound to version 1.16.2 or higher.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration via the novel ghost domain where malicious users can trigger continued resolvability of malicious domain names.

Exploiting this vulnerability is possible by targeting an 'Unbound' instance and querying for a rogue domain name when the cached delegation information is about to expire, leading to overwriting of the expired entries.

CVSS Base Scores

version 3.1