Vulnerability Description
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvpn | Openvpn Access Server | 2.1.4 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2017/05/23/13ExploitMailing ListThird Party Advisory
- http://www.securitytracker.com/id/1038547Third Party AdvisoryVDB Entry
- https://sysdream.com/news/lab/2017-05-05-cve-2017-5868-openvpn-access-server-crlExploitMitigationThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/05/23/13ExploitMailing ListThird Party Advisory
- http://www.securitytracker.com/id/1038547Third Party AdvisoryVDB Entry
- https://sysdream.com/news/lab/2017-05-05-cve-2017-5868-openvpn-access-server-crlExploitMitigationThird Party Advisory
FAQ
What is CVE-2017-5868?
CVE-2017-5868 is a vulnerability with a CVSS score of 6.1 (MEDIUM). CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly...
How severe is CVE-2017-5868?
CVE-2017-5868 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5868?
Check the references section above for vendor advisories and patch information. Affected products include: Openvpn Openvpn Access Server.