ID

VAR-201712-0921


CVE

CVE-2017-17747


TITLE

TP-Link TL-SG108E Access control vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-011616

DESCRIPTION

Weak access controls in the Device Logout functionality on the TP-Link TL-SG108E v1.0.0 allow remote attackers to call the logout functionality, triggering a denial of service condition. TP-Link TL-SG108E Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The TP-LinkTL-SG108E is a Gigabit Ethernet switch from China's TP-LINK. Overview ------------- Three vulnerabilities have been discovered in the TP-Link TL-SG108E, firmware 1.0.0 Build 20160722 Rel.50167: CVE-2017-17745 - Cross Site Scripting (XSS) in system_name_set.cgi, sysName parameter CVE-2017-17746 - Weak access control for user authentication CVE-2017-17747 - Weak access control for user logout This is not an exhaustive list of vulnerabilities that may exist in the device firmware. Device Overview ----------------------- >From http://www.tp-link.com.au/products/details/cat-41_TL-SG108E.html - "The TL-SG108E 8-Port Gigabit Easy Smart switch is an ideal upgrade from an unmanaged switch, designed for Small and Medium Business networks that require simple network management. Network administrators can effectively monitor traffic via Port Mirroring, Loop Prevention and Cable Diagnostics features." Affected Devices ----------------------- Firmware Version: 1.0.0 Build 20160722 Rel.50167 Hardware Version: TL-SG108E 3.0 Older TL-SG108E devices may also be affected. Disclosure Timeline -------------------------- September 08th, 2017 - Vulnerabilities discovered after purchasing the device. September 10th, 2017 - Contacted TP-Link via tp-link.com.au September 12th, 2017 - TP-Link responded, requesting further information September 12th, 2017 - Responded to TP-Link with vulnerability specifics. Advised a 90 day disclosure timeline, with offer to increase deadline if TP-Link wishes. September 12th -> October 16th - Emails back and forth discussing how to trigger the vulnerabilities. October 16th, 2017 - TP-Link confirms XSS vulnerability (CVE-2017-17745), advises an updated firmware will be released. TP-Link advises two remaining vulnerabilities (CVE-2017-17746, CVE-2017-17747) will not be fixed. December 18th, 2017 - Applied to Mitre for CVE numbers. December 19th, 2017 - Mitre assigned CVE-2017-17745, CVE-2017-17746, CVE-2017-17747 December 19th, 2017 - Public disclosure. As of this date (December 19th, 2017), no updated firmware has been offered for testing, or released to the public. Notes -------- In all examples below, the TL-SG108E was configured with a LAN IP address of 192.168.1.6. Many thanks to Simon @ TP-Link for the prompt email responses. CVE-2017-17745 - Stored Cross Site Scripting (XSS) ------------------------------------------------------------------------- * Device is not validating input to the script system_name_set.cgi on the TL-SG108E or on output to screen. * Only the sysName variable in system_name_set.cgi was tested in this instance. Other fields in the management web-application may have similar problems, these were not tested. Risks: * In some network configurations (such as behind a NAT router, as outlined in CVE-2017-17746) a malicious user could store XSS on the TL-SG108E and cause the administrator of the TL-SG108E to execute arbitrary javascript code in their browser. Proof of Concept: * Authenticate to the device in a browser * Execute the following command from a terminal window: curl -vvvs -X 'GET' 'http://192.168.1.6/system_name_set.cgi?sysName=TL-SG"\]\};alert(1);</script>' * To trigger the XSS: Browse -> System -> System Info. Alert box containing '1' displays, indicating successful javascript execution. Mitigation: * Set the device password to a strong password. * Restrict access to the device from approved administrator workstations until an updated firmware is available. CVE-2017-17746 - Weak access control ------------------------------------------------------ * All information regarding authenticated sessions is stored on the TL-SG108E, no cookies are sent from the device to the client after successful authentication. Risks: * Any other browser on a PC which has authenticated, is then also treated as authenticated (Example: Login in Chrome, then open Firefox and browse to the TL-SG108E, and the session is already authenticated) * If the TL-SG108E is on the other side of a NAT router, ALL clients behind the NAT are treated as authenticated. Steps to reproduce: * Authenticate from any PC. * Any other browser on that system is then able to access the web-interface without entering authentication information. * By extension, guest VMs on that machine are then automatically authenticated. Mitigation: * Restrict access to the device from approved administrator workstations until an updated firmware is available. * Prevent any access to the web interface from devices behind a NAT router. CVE-2017-17747 - Weak access control on Logout.htm ------------------------------------------------------------------------- * Logout.htm can be called from any IP address, ending any authenticated sessions on the device. Steps to reproduce: * Authenticate from any PC. * From another PC with a different IP address, access the logout page (http://192.168.1.6/Logout.htm) * The session on the first PC has been terminated. Mitigation: * Restrict access to the device from approved administrator workstations until an updated firmware is available. -- End disclosure

Trust: 2.34

sources: NVD: CVE-2017-17747 // JVNDB: JVNDB-2017-011616 // CNVD: CNVD-2017-38107 // VULHUB: VHN-108800 // PACKETSTORM: 145503

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-38107

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-sg108escope:eqversion:1.0.0

Trust: 2.4

vendor:tp linkmodel:tl-sg108e build rel.50167scope:eqversion:1.0.020160722

Trust: 0.6

sources: CNVD: CNVD-2017-38107 // JVNDB: JVNDB-2017-011616 // CNNVD: CNNVD-201712-695 // NVD: CVE-2017-17747

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17747
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-17747
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-38107
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201712-695
value: MEDIUM

Trust: 0.6

VULHUB: VHN-108800
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-17747
severity: LOW
baseScore: 2.7
vectorString: AV:A/AC:L/AU:S/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-38107
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-108800
severity: LOW
baseScore: 2.7
vectorString: AV:A/AC:L/AU:S/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17747
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-38107 // VULHUB: VHN-108800 // JVNDB: JVNDB-2017-011616 // CNNVD: CNNVD-201712-695 // NVD: CVE-2017-17747

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-108800 // JVNDB: JVNDB-2017-011616 // NVD: CVE-2017-17747

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201712-695

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201712-695

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011616

PATCH

title:TL-SG108Eurl:http://www.tp-link.in/products/details/cat-41_TL-SG108E.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-011616

EXTERNAL IDS

db:NVDid:CVE-2017-17747

Trust: 3.2

db:JVNDBid:JVNDB-2017-011616

Trust: 0.8

db:CNNVDid:CNNVD-201712-695

Trust: 0.7

db:EXPLOITALERTid:28210

Trust: 0.6

db:CNVDid:CNVD-2017-38107

Trust: 0.6

db:VULHUBid:VHN-108800

Trust: 0.1

db:PACKETSTORMid:145503

Trust: 0.1

sources: CNVD: CNVD-2017-38107 // VULHUB: VHN-108800 // JVNDB: JVNDB-2017-011616 // PACKETSTORM: 145503 // CNNVD: CNNVD-201712-695 // NVD: CVE-2017-17747

REFERENCES

url:http://seclists.org/fulldisclosure/2017/dec/67

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2017-17747

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17747

Trust: 0.8

url:http://www.exploitalert.com/view-details.html?id=28210

Trust: 0.6

url:http://www.tp-link.com.au/products/details/cat-41_tl-sg108e.html

Trust: 0.1

url:http://192.168.1.6/system_name_set.cgi?sysname=tl-sg"\]\};alert(1);</script>'

Trust: 0.1

url:http://192.168.1.6/logout.htm)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17745

Trust: 0.1

sources: CNVD: CNVD-2017-38107 // VULHUB: VHN-108800 // JVNDB: JVNDB-2017-011616 // PACKETSTORM: 145503 // CNNVD: CNNVD-201712-695 // NVD: CVE-2017-17747

CREDITS

James McLean

Trust: 0.1

sources: PACKETSTORM: 145503

SOURCES

db:CNVDid:CNVD-2017-38107
db:VULHUBid:VHN-108800
db:JVNDBid:JVNDB-2017-011616
db:PACKETSTORMid:145503
db:CNNVDid:CNNVD-201712-695
db:NVDid:CVE-2017-17747

LAST UPDATE DATE

2025-04-20T23:25:53.251000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-38107date:2017-12-26T00:00:00
db:VULHUBid:VHN-108800date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-011616date:2018-01-23T00:00:00
db:CNNVDid:CNNVD-201712-695date:2019-10-23T00:00:00
db:NVDid:CVE-2017-17747date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-38107date:2017-12-26T00:00:00
db:VULHUBid:VHN-108800date:2017-12-20T00:00:00
db:JVNDBid:JVNDB-2017-011616date:2018-01-23T00:00:00
db:PACKETSTORMid:145503date:2017-12-20T01:35:37
db:CNNVDid:CNNVD-201712-695date:2017-12-19T00:00:00
db:NVDid:CVE-2017-17747date:2017-12-20T20:29:00.467