CVE-2017-16614
📋 TL;DR
This is a Server-Side Request Forgery (SSRF) vulnerability in tpshop e-commerce software that allows attackers to make the server send requests to internal or external systems. Attackers can potentially access sensitive information, attack internal network hosts, or achieve remote command execution. Affects tpshop versions 2.0.5 and 2.0.6.
💻 Affected Systems
- tpshop
📦 What is this software?
Tpshop by Tp Shop
Tpshop by Tp Shop
⚠️ Risk & Real-World Impact
Worst Case
Remote command execution leading to complete system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Information disclosure from internal services and potential internal network reconnaissance.
If Mitigated
Limited to error messages or failed requests if proper network segmentation and input validation are implemented.
🎯 Exploit Status
Exploitation requires sending crafted requests to the vulnerable endpoint with malicious URLs in the fBill parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.7 or later
Vendor Advisory: http://seclists.org/fulldisclosure/2018/Mar/77
Restart Required: No
Instructions:
1. Upgrade tpshop to version 2.0.7 or later. 2. Replace the vulnerable file plugins/payment/weixin/lib/WxPay.tedatac.php with the patched version. 3. Verify the fix by testing the vulnerable endpoint.
🔧 Temporary Workarounds
Input Validation Filter
allAdd URL validation to reject malicious URLs in the fBill parameter
Modify plugins/payment/weixin/lib/WxPay.tedatac.php to validate URLs before processing
Network Segmentation
allRestrict outbound network access from the web server
Configure firewall rules to block web server access to internal networks
🧯 If You Can't Patch
- Implement a Web Application Firewall (WAF) with SSRF protection rules
- Disable or remove the vulnerable WeChat payment plugin
🔍 How to Verify
Check if Vulnerable:
Send a request to the vulnerable endpoint with a URL pointing to an internal service in the fBill parameter and check if the server attempts to connect.
Check Version:
Check tpshop version in admin panel or configuration files
Verify Fix Applied:
Attempt the same SSRF test after patching; the server should reject or sanitize the malicious URL.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server to internal IPs
- Requests to plugins/payment/weixin/lib/WxPay.tedatac.php with URL parameters
Network Indicators:
- Web server making unexpected connections to internal services
- Outbound requests to unusual ports from web server
SIEM Query:
source_ip=web_server AND dest_ip=internal_range AND protocol=HTTP