Multiple cross-site request forgery (CSRF) vulnerabilities in the XML-RPC API in the Desktop Client in OpenVPN Access Server 1.5.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) disconnecting established VPN sessions, (2) connect to arbitrary VPN servers, or (3) create VPN profiles and execute arbitrary commands via crafted API requests.
References
Configurations
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://openvpn.net/index.php/access-server/security-advisories.html - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2014/Jul/76 - Exploit | |
References | () http://www.securityfocus.com/archive/1/532795/100/0/threaded - | |
References | () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-1_OpenVPN_Access_Server_Desktop_Client_Remote_Code_Execution_via_CSRF_v10.txt - Exploit | |
References | () https://www.youtube.com/watch?v=qhgysgfvQh8 - Exploit |
Information
Published : 2014-11-26 15:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9104
Mitre link : CVE-2014-9104
CVE.ORG link : CVE-2014-9104
JSON object : View
Products Affected
openvpn
- openvpn_access_server
CWE
CWE-352
Cross-Site Request Forgery (CSRF)