Command Injection Affecting openvpn-monitor package, versions [0,]
Threat Intelligence
EPSS
0.12% (48th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-OPENVPNMONITOR-1726645
- published 27 Sep 2021
- disclosed 27 Sep 2021
- credit Unknown
Introduced: 27 Sep 2021
CVE-2021-31605 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
openvpn-monitor is a web based OpenVPN monitor, that shows current connection information, such as users, location and data transferred.
Affected versions of this package are vulnerable to Command Injection via the OpenVPN management interface socket. An attacker can use a newline character (0x0a
) to inject additional commands into the socket. This allows an attacker for example to stop the OpenVPN server
by sending a SIGTERM signal via the signal SIGTERM
management command.
References
CVSS Scores
version 3.1