furlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/furlongm/openvpn-monitor/releases | third party advisory release notes |
http://packetstormsecurity.com/files/164281/OpenVPN-Monitor-1.1.3-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |