ID

VAR-202005-0351


CVE

CVE-2020-12475


TITLE

TP-Link Omada Controller Path traversal vulnerabilities in software

Trust: 0.8

sources: JVNDB: JVNDB-2020-005077

DESCRIPTION

TP-Link Omada Controller Software 3.2.6 allows Directory Traversal for reading arbitrary files via com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar. TP-Link Omada Controller Software is a set of software supported by China Pulian (TP-Link) company to manage wireless access points. Attackers can use this vulnerability to read arbitrary files by using com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar

Trust: 1.8

sources: NVD: CVE-2020-12475 // JVNDB: JVNDB-2020-005077 // VULHUB: VHN-165157 // VULMON: CVE-2020-12475

AFFECTED PRODUCTS

vendor:tp linkmodel:omada controllerscope:eqversion:3.2.6

Trust: 1.9

sources: VULMON: CVE-2020-12475 // JVNDB: JVNDB-2020-005077 // NVD: CVE-2020-12475

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12475
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-005077
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202005-037
value: MEDIUM

Trust: 0.6

VULHUB: VHN-165157
value: LOW

Trust: 0.1

VULMON: CVE-2020-12475
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-12475
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-005077
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-165157
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-12475
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-005077
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-165157 // VULMON: CVE-2020-12475 // JVNDB: JVNDB-2020-005077 // CNNVD: CNNVD-202005-037 // NVD: CVE-2020-12475

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-165157 // JVNDB: JVNDB-2020-005077 // NVD: CVE-2020-12475

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202005-037

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202005-037

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-005077

PATCH

title:Download for Omada Software Controller V1url:https://www.tp-link.com/us/support/download/omada-software-controller/

Trust: 0.8

sources: JVNDB: JVNDB-2020-005077

EXTERNAL IDS

db:NVDid:CVE-2020-12475

Trust: 2.6

db:JVNDBid:JVNDB-2020-005077

Trust: 0.8

db:CNNVDid:CNNVD-202005-037

Trust: 0.7

db:NSFOCUSid:47491

Trust: 0.6

db:VULHUBid:VHN-165157

Trust: 0.1

db:VULMONid:CVE-2020-12475

Trust: 0.1

sources: VULHUB: VHN-165157 // VULMON: CVE-2020-12475 // JVNDB: JVNDB-2020-005077 // CNNVD: CNNVD-202005-037 // NVD: CVE-2020-12475

REFERENCES

url:https://sovietw0rm.wordpress.com/2020/04/29/tp-link-omada-controller-directory-traversal-vulnerability/

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-12475

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12475

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47491

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-165157 // VULMON: CVE-2020-12475 // JVNDB: JVNDB-2020-005077 // CNNVD: CNNVD-202005-037 // NVD: CVE-2020-12475

SOURCES

db:VULHUBid:VHN-165157
db:VULMONid:CVE-2020-12475
db:JVNDBid:JVNDB-2020-005077
db:CNNVDid:CNNVD-202005-037
db:NVDid:CVE-2020-12475

LAST UPDATE DATE

2024-11-23T22:29:37.917000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-165157date:2020-05-08T00:00:00
db:VULMONid:CVE-2020-12475date:2020-05-08T00:00:00
db:JVNDBid:JVNDB-2020-005077date:2020-06-05T00:00:00
db:CNNVDid:CNNVD-202005-037date:2020-08-07T00:00:00
db:NVDid:CVE-2020-12475date:2024-11-21T04:59:46.707

SOURCES RELEASE DATE

db:VULHUBid:VHN-165157date:2020-05-04T00:00:00
db:VULMONid:CVE-2020-12475date:2020-05-04T00:00:00
db:JVNDBid:JVNDB-2020-005077date:2020-06-05T00:00:00
db:CNNVDid:CNNVD-202005-037date:2020-05-04T00:00:00
db:NVDid:CVE-2020-12475date:2020-05-04T14:15:13.327