CVE-2023-27132

9.8 CRITICAL

📋 TL;DR

TSplus Remote Work 16.0.0.0 exposes cleartext passwords in HTML source code, allowing attackers to steal credentials. This affects organizations using the vulnerable version of TSplus Remote Work for remote access. Attackers can obtain passwords without authentication by viewing page source.

💻 Affected Systems

Products:
  • TSplus Remote Work
Versions: 16.0.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects TSplus Remote Work, not TSplus Remote Access (see CVE-2023-31069). The vulnerability is present in the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of TSplus Remote Work environment leading to unauthorized access to internal systems, data theft, and lateral movement across the network.

🟠

Likely Case

Credential theft enabling unauthorized access to the TSplus portal and potentially connected systems, with possible privilege escalation.

🟢

If Mitigated

Limited impact if strong network segmentation, monitoring, and access controls prevent credential misuse after theft.

🌐 Internet-Facing: HIGH - The vulnerability is in a web portal often exposed to the internet, making it easily discoverable and exploitable.
🏢 Internal Only: MEDIUM - Even internally, attackers with network access could exploit this to steal credentials and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only viewing HTML source code of the web portal, making it trivial. Public proof-of-concept details are available in the Packet Storm references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is documented. Check the TSplus vendor website for updates or contact vendor support for a fix. Consider upgrading to a newer version if available.

🔧 Temporary Workarounds

Disable or Restrict Web Portal Access

all

Temporarily disable the TSplus Remote Work web portal or restrict access to trusted IP addresses only to prevent exploitation.

Use firewall rules to block external access to the TSplus web portal port (default may be 80/443).

Implement Web Application Firewall (WAF)

all

Deploy a WAF to filter requests and block attempts to access or scrape HTML source code containing passwords.

Configure WAF rules to detect and block requests with patterns like 'var pass' in responses or excessive source code viewing.

🧯 If You Can't Patch

  • Monitor and audit access logs for unusual activity, such as multiple requests to the web portal or source code viewing.
  • Enforce strong password policies and multi-factor authentication (MFA) to reduce impact if credentials are stolen.

🔍 How to Verify

Check if Vulnerable:

Access the TSplus Remote Work web portal, view the HTML source code (e.g., right-click and select 'View Page Source' in browser), and search for 'var pass' to see if a cleartext password is exposed.

Check Version:

Check the TSplus Remote Work version in the application interface or configuration files; no standard command is provided by the vendor.

Verify Fix Applied:

After applying any workaround or update, repeat the source code check to ensure 'var pass' no longer contains a cleartext password.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to the web portal, such as rapid requests or source code retrieval attempts in web server logs.

Network Indicators:

  • Traffic spikes to the TSplus web portal or outbound connections from the portal server post-exploitation.

SIEM Query:

source="tsplus_logs" AND (url="*view-source*" OR user_agent="*scraper*" OR status=200 AND response_size>typical)

🔗 References

📤 Share & Export