Vulnerability Name: | CVE-2017-5868 (CCN-126376) | ||||||||||||
Assigned: | 2017-05-24 | ||||||||||||
Published: | 2017-05-24 | ||||||||||||
Updated: | 2017-06-06 | ||||||||||||
Summary: | CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:U/RC:R)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-93 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5868 Source: CCN Type: SECTRACK ID: 1038547 OpenVPN Access Server Input Validation Flaw Lets Remote Users Conduct Session Fixation Attacks to Hijack a Target User's Session Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20170523 [CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation Source: SECTRACK Type: Third Party Advisory, VDB Entry 1038547 Source: XF Type: UNKNOWN openvpn-cve20175868-session-hijacking(126376) Source: CCN Type: OpenVPN Web site Access Server Source: MISC Type: Exploit, Mitigation, Third Party Advisory https://sysdream.com/news/lab/2017-05-05-cve-2017-5868-openvpn-access-server-crlf-injection-with-session-fixation/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |