SB2017052401 - CRLF injection in OpenVPN Access Server
Published: May 24, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) CRLF injection (CVE-ID: CVE-2017-5868)
The vulnerability allows a remote attacker to inject arbitrary session cookies and gain control over victim's VPN session.
The vulnerability exists due to insufficient sanitization of user-supplied data (e.g. %0A character), passed via URL. A remote attacker can create a specially crafted link, trick the victim into following it and spoof HTTP headers, used by OpenVPN Access Server to authenticate users.
Successful exploitation of the vulnerability may allow an attacker to inject arbitrary cookie values, including session identifier, and gain full access to victim's session.
Exploitation example for injecting victim's session identifier, controlled by the attacker:
https://[host]/__session_start__/%0aSet-Cookie: openvpn_sess_******=******cf23; Path=/; Secure; HttpOnly
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.