First published: Fri May 26 2017(Updated: )
CRLF injection vulnerability in the web interface in OpenVPN Access Server 2.1.4 allows remote attackers to inject arbitrary HTTP headers and consequently conduct session fixation attacks and possibly HTTP response splitting attacks via "%0A" characters in the PATH_INFO to __session_start__/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Access Server | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5868 is considered a critical vulnerability due to its potential for session fixation and HTTP response splitting attacks.
To fix CVE-2017-5868, upgrade OpenVPN Access Server to version 2.1.5 or later, as it addresses this vulnerability.
CVE-2017-5868 allows for session fixation attacks and potentially HTTP response splitting attacks.
OpenVPN Access Server version 2.1.4 is affected by CVE-2017-5868.
CVE-2017-5868 can be exploited through CRLF injection via "%0A" characters in the PATH_INFO during session initiation.