Vulnerability CVE-2015-6922


Published: 2020-02-17

Description:
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Kaseya Virtual System Administrator Code Execution / Privilege Escalation
Agile Informatio...
30.09.2015
High
Kaseya VSA uploader.aspx Arbitrary File Upload
Pedro Ribeiro
06.10.2015

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

 References:
http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html
http://www.zerodayinitiative.com/advisories/ZDI-15-448
http://www.zerodayinitiative.com/advisories/ZDI-15-449
https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
https://www.exploit-db.com/exploits/38351/

Copyright 2024, cxsecurity.com

 

Back to Top