Admin-Ahead Bulk DNS TTL Changer – Input Validation Failure (R911-0088)

Type: Input Validation Failure
Location: Remote
Impact: Medium
Product: Admin-Ahead Bulk DNS TTL Changer
Website: http://admin-ahead.com/aast-bulk-dns-ttl-changer-cpanelwhm-v1-0/
Vulnerable Version: 1.0.0
Fixed Version: 1.0.1
CVE: -
R911: 0088
Date: 2013-11-18
By: Rack911

Product Description:

Here we introduce the A-AST Bulk DNS TTL changer v1.0 for cPanel/WHM. With this interface, you get to lower TTL values for multiple domains all at once, and make sure that the DNS information that you change will take effect in a shorter interval of time. What’s more? Once your migration is complete, you can use this same tool to raise the DNS TTL values of multiple domains and thus make life a little easier on name servers.

Vulnerability Description:

There is an input validation failure vulnerability that would allow an attacker to modify the TTL to any domain on the server.

Impact:

We have deemed this vulnerability to be rated as MEDIUM due to the fact that any domain’s TTL can be modified.

Vulnerable Version:

This vulnerability was tested against Admin-Ahead Bulk DNS TTL Changer v1.0.0 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in Admin-Ahead Bulk DNS TTL Changer v1.0.1.

Vendor Contact Timeline:

2013-11-17: Vendor contacted via email.
2013-11-17: Vendor confirms vulnerability.
2013-11-18: Vendor issues 1.0.1 update.
2013-11-18: Rack911 issues security advisory.