what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenVPN Access Server Arbitrary Code Execution

OpenVPN Access Server Arbitrary Code Execution
Posted Jul 16, 2014
Authored by S. Viehbock | Site sec-consult.com

Remote attackers can execute arbitrary code and execute other attacks on computers with the OpenVPN Access Server "Desktop Client" installed.

tags | advisory, remote, arbitrary
SHA-256 | 3f95a17f5a3e3e08e1e5b964c913a1f26f928b80824fd0094146709d8a80f674

OpenVPN Access Server Arbitrary Code Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SEC Consult Vulnerability Lab Security Advisory < 20140716-1 >
=======================================================================
title: Remote Code Execution via CSRF
product: OpenVPN Access Server "Desktop Client"
vulnerable version: all
fixed version: not available
impact: critical
homepage: http://www.openvpn.net
found: 2014-05-12
by: Stefan Viehböck
SEC Consult Vulnerability Lab
https://www.sec-consult.com
=======================================================================

Vendor description:
- -------------------
OpenVPN Technologies is a privately held company based in the Pleasanton,
California, integrating a suite of leading-edge networking and software
technologies.

Source: http://openvpn.net/index.php/about-menu/about-us.html

Business recommendation:
- ------------------------
Remote attackers can execute arbitrary code and execute other attacks on
computers with the OpenVPN Access Server "Desktop Client" installed. Affected
users should upgrade immediately to the OpenVPN Connect client.

Taken from OpenVPNs advisory:
"This advisory only applies to the OpenVPN Access Server "Desktop Client" app
for Windows, and does not affect OpenVPN Connect, Private Tunnel, or community
builds of OpenVPN for Windows."


Vulnerability overview/description:
- -----------------------------------
The OpenVPN Access Server "Desktop Client" consists of two parts, a Windows
service that offers an XML-RPC API via a webserver on localhost and a GUI
component that connects to this API.

The XML-RPC API is vulnerable to Cross-Site Request Forgery (CSRF). Using the
API commands an attacker can:
- - unmask a victim (e.g. by disconnecting an established VPN connection)
- - perform MITM attacks (by connecting the victim to an "evil" VPN server)
- - execute arbitrary code with SYSTEM privileges (by adding a VPN profile that
executes code)


Proof of concept:
- -----------------
Detailed proof of concept exploits have been removed for this vulnerability.

A video demonstrating this issue has been released by SEC Consult:
https://www.youtube.com/watch?v=qhgysgfvQh8


Vulnerable / tested versions:
- -----------------------------
The vulnerabilities have been verified to exist in OpenVPN Access Server
"Desktop Client" version 1.5.6, which was the most recent version at the time
of discovery.
All other versions of the product are affected as well.


Vendor contact timeline:
- ------------------------
2014-05-12: Opening ticket at https://openvpn.net and attaching exploit and
video.
2014-05-15: Vendor requests info about tested versions.
2014-05-15: Clarifying that tested version was obtained via
http://swupdate.openvpn.net/downloads/openvpn-client.msi
2014-05-20: Vendor requests info about PrivateTunnel client (mentioned in
initial advisory) and provides link to version with implemented
CSRF mitigations.
2014-05-21: Clarifying that PrivateTunnel might be affected and patch
validation is not covered.
[back and forth regarding whether PrivateTunnel is affected]
2014-07-01: Vendor announces that users should upgrade to OpenVPN Connect
client.
2014-07-16: SEC Consult releases coordinated security advisory.


Solution:
- ---------
Upgrade to the OpenVPN Connect client.

More information can be found at:
http://openvpn.net/index.php/access-server/security-advisories.html


Workaround:
- -----------
No workaround available.


Advisory URL:
- -------------
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab

SEC Consult
Vienna - Bangkok - Frankfurt/Main - Montreal - Singapore - Vilnius

Headquarter:
Mooslackengasse 17, 1190 Vienna, Austria
Phone: +43 1 8903043 0
Fax: +43 1 8903043 15

Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult

Interested in working with the experts of SEC Consult?
Write to career@sec-consult.com

EOF Stefan Viehböck / @2014
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTxl3WAAoJECyFJyAEdlkKLTQIAI5PpEVH7aMhma0an/asHl21
SH8G1iEVU5dYjaoNNmGdoKXz8TMm/2XA7OP+ny6pp9LJOAeWJwbmDbFTDpiwhdRO
sC3TBI2cAhJTZpLRA5xvby6kFBluDmuG5/DNEynkAopQ73mB7RoacR5IKIigMvX1
PQPMrAjtnagAYZrIfcsXLC/RDcTVm5S1QqCYjs6/UCA40TiC7mGiSRN8s8Yr3ffB
rqMUg8TG/Ul/0rM11fjapW/It/G15Ms5mzqamBVbVAT0mrHel12DrkZm59D49vwz
fjghvNJ4aAyoe/yQECsmIMHosDOEvG9MGK4Zin0o9/n0yT9Cc4G1EidD5OHx+54=
=sNMW
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close