CRLF injection in OpenVPN Access Server - CVE-2017-5868

 

CRLF injection in OpenVPN Access Server - CVE-2017-5868

Published: May 24, 2017 / Updated: May 24, 2017


Vulnerability identifier: #VU6662
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-5868
CWE-ID: CWE-113
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: OpenVPN
Affected software:
OpenVPN Access Server

Detailed vulnerability description

The vulnerability allows a remote attacker to inject arbitrary session cookies and gain control over victim's VPN session.

The vulnerability exists due to insufficient sanitization of user-supplied data (e.g. %0A character), passed via URL. A remote attacker can create a specially crafted link, trick the victim into following it and spoof HTTP headers, used by OpenVPN Access Server to authenticate users.

Successful exploitation of the vulnerability may allow an attacker to inject arbitrary cookie values, including session identifier, and gain full access to victim's session.

Exploitation example for injecting victim's session identifier, controlled by the attacker:

https://[host]/__session_start__/%0aSet-Cookie:
openvpn_sess_******=******cf23; Path=/; Secure; HttpOnly

How to mitigate CVE-2017-5868

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources