// For flags

CVE-2018-7544

 

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning

** EN DISPUTA ** Se ha descubierto un problema en la interfaz de gestión en OpenVPN hasta la versión 2.4.5. Cuando esta interfaz está habilitada en TCP sin contraseña y cuando no hay más clientes conectados a esta interfaz, los atacantes pueden ejecutar comandos arbitrarios de gestión, obtener información sensible o provocar una denegación de servicio (SIGTERM) al desencadenar acciones XMLHttpRequest en un navegador web. Esto se demuestra mediante un POST multipart/form-data en http://localhost:23000 con un comando "signal SIGTERM" en un elemento TEXTAREA. NOTA: El fabricante discute que esto sea una vulnerabilidad. Afirman que este es el resultado de una configuración incorrecta de la instancia OpenVPN en lugar de una vulnerabilidad intrínseca; ahora advierten de forma aún más explícita contra tal configuración, tanto en la documentación de la interfaz de gestión como en un mensaje runtime.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-27 CVE Reserved
  • 2018-03-16 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-134: Use of Externally-Controlled Format String
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openvpn
Search vendor "Openvpn"
Openvpn
Search vendor "Openvpn" for product "Openvpn"
<= 2.4.5
Search vendor "Openvpn" for product "Openvpn" and version " <= 2.4.5"
-
Affected