Kaseya

Vsa

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.78%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:20

The API call /InstallTab/exportFldr.asp is vulnerable to a semi-authenticated boolean-based blind SQL injection in the parameter fldrId. Detailed description --- Given the following request: ``` GET /InstallTab/exportFldr.asp?fldrId=1’ HTTP/1.1 Host:...

Exploit
  • EPSS 63.09%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:20

An attacker can upload files with the privilege of the Web Server process for Kaseya VSA Unified Remote Monitoring & Management (RMM) 9.5.4.2149 and subsequently use these files to execute asp commands The api /SystemTab/uploader.aspx is vulnerable t...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:20

Authenticated reflective XSS in HelpDeskTab/rcResults.asp The parameter result of /HelpDeskTab/rcResults.asp is insecurely returned in the requested web page and can be used to perform a Cross Site Scripting attack Example request: `https://x.x.x.x/H...

  • EPSS 0.41%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:20

Kaseya VSA before 9.5.7 allows attackers to bypass the 2FA requirement. The need to use 2FA for authentication in enforce client-side instead of server-side and can be bypassed using a local proxy. Thus rendering 2FA useless. Detailed description ---...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:20

Semi-authenticated local file inclusion The contents of arbitrary files can be returned by the webserver Example request: `https://x.x.x.x/KLC/js/Kaseya.SB.JS/js.aspx?path=C:\Kaseya\WebPages\dl.asp` A valid sessionId is required but can be easily obt...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 09.07.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:03:30

The API /vsaWS/KaseyaWS.asmx can be used to submit XML to the system. When this XML is processed (external) entities are insecurely processed and fetched by the system and returned to the attacker. Detailed description Given the following request: ``...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 11.10.2019 12:15:11
  • Zuletzt bearbeitet 21.11.2024 04:26:52

An issue was discovered in Kaseya VSA RMM through 9.5.0.22. When using the default configuration, the LAN Cache feature creates a local account FSAdminxxxxxxxxx (e.g., FSAdmin123456789) on the server that hosts the LAN Cache and all clients that are ...