Access Restriction Bypass Affecting openvpn-monitor package, versions [0,]
Threat Intelligence
EPSS
0.23% (63rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-OPENVPNMONITOR-1726643
- published 27 Sep 2021
- disclosed 27 Sep 2021
- credit Unknown
Introduced: 27 Sep 2021
CVE-2021-31606 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
openvpn-monitor is a web based OpenVPN monitor, that shows current connection information, such as users, location and data transferred.
Affected versions of this package are vulnerable to Access Restriction Bypass. When the openvpn-monitor
application is accessed, the disconnect button is not
displayed (as expected). However, there is no authorization check implemented which check if the
functionality is allowed to be used or not. An attacker can use this to disconnect arbitrary clients.
References
CVSS Scores
version 3.1