Miggo Logo

CVE-2021-31605: furlongm openvpn-monitor command injection

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.86844%
Published
5/24/2022
Updated
10/8/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
openvpn-monitorpip<= 1.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information describes command injection via the OpenVPN management interface socket using %0a (newline) characters, but no specific code snippets, commit diffs, or file paths were available in the provided sources. The advisory indicates the vulnerability stems from improper input sanitization when processing data from the management interface, likely in functions handling socket communication or command execution. However, without access to the actual codebase (e.g., functions using os.system, subprocess, or socket handlers in the openvpn-monitor package), we cannot identify specific function names or file paths with high confidence. The vulnerability mechanism is understood (CWE-77), but the lack of code-level details prevents precise function identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*urlon*m op*nvpn-monitor t*rou** *.*.* *llows `%**` *omm*n* inj**tion vi* t** Op*nVPN m*n***m*nt int*r**** so*k*t. T*is **n s*ut *own t** s*rv*r vi* si*n*l `SI*T*RM`.

Reasoning

T** provi*** vuln*r**ility in*orm*tion **s*ri**s *omm*n* inj**tion vi* t** Op*nVPN m*n***m*nt int*r**** so*k*t usin* %** (n*wlin*) ***r**t*rs, *ut no sp**i*i* *o** snipp*ts, *ommit *i**s, or *il* p*t*s w*r* *v*il**l* in t** provi*** sour**s. T** **vi