<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Zone-Transfer — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/zone-transfer/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/zone-transfer/feed.xml" rel="self" type="application/rss+xml"/><item><title>CoreDNS Transfer Plugin ACL Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-coredns-acl-bypass/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-coredns-acl-bypass/</guid><description>CoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.</description><content:encoded><![CDATA[<p>A vulnerability exists in the CoreDNS transfer plugin related to Access Control List (ACL) stanza selection. When both a parent zone and a more-specific subzone are configured with transfer rules, CoreDNS versions prior to 1.14.3 may incorrectly prioritize the parent zone&rsquo;s rule over the subzone&rsquo;s due to a lexicographic string comparison instead of a proper longest-match algorithm. This can lead to a permissive parent-zone transfer rule overriding a more restrictive subzone rule, allowing unauthorized clients to perform AXFR/IXFR requests and retrieve zone contents they should not have access to. This vulnerability matters because it can expose sensitive DNS information to unauthorized parties, potentially aiding reconnaissance or enabling further attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a CoreDNS server running a version prior to 1.14.3.</li>
<li>The attacker determines that the CoreDNS server is configured with both a parent zone (e.g., example.org.) and a subzone (e.g., a.example.org.) with different transfer ACLs. The parent zone&rsquo;s ACL is more permissive than the subzone&rsquo;s.</li>
<li>The attacker crafts an AXFR or IXFR request specifically targeting the subzone (a.example.org.).</li>
<li>The CoreDNS server&rsquo;s transfer plugin incorrectly selects the parent zone&rsquo;s ACL due to the lexicographic comparison logic, which favors &ldquo;example.org.&rdquo; over &ldquo;a.example.org.&rdquo;.</li>
<li>The server authorizes the transfer based on the permissive parent zone ACL.</li>
<li>The CoreDNS server responds to the attacker&rsquo;s request, providing the full zone contents of the subzone.</li>
<li>The attacker receives the zone data, gaining access to information such as hostnames, IP addresses, and other DNS records that should have been protected by the subzone&rsquo;s restrictive ACL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized zone transfers, exposing sensitive DNS information. The impact is significant as it can lead to the disclosure of internal network structures, server names, and other critical data, potentially facilitating reconnaissance for further attacks. The severity is compounded by the non-intuitive nature of the vulnerability, making it difficult to detect and remediate without a clear understanding of the underlying issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoreDNS to version 1.14.3 or later to address the vulnerability (CVE-2026-33489).</li>
<li>Review CoreDNS transfer configurations to ensure subzone ACLs are not inadvertently bypassed by more permissive parent zone ACLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33489</category><category>acl-bypass</category><category>dns</category><category>zone-transfer</category><category>coredns</category></item></channel></rss>