lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 13 Jan 2018 17:12:02 +0100 From: "Securify B.V." <lists@...urify.nl> To: bugtraq@...urityfocus.com Subject: Authentication bypass in Kaseya VSA ------------------------------------------------------------------------ Authentication bypass in Kaseya VSA ------------------------------------------------------------------------ Kin Hung Cheng, Robert Hartshorn, May 2017 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ A security vulnerability was found in Kaseya VSA that allows users to view remote computers that they are not authorised to view. Using this vulnerability a user that is authenticated to view at least one remote computer can view ever machines in the Kaseya application. ------------------------------------------------------------------------ Tested versions ------------------------------------------------------------------------ This issue was successfully tested on version R9.2 ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ Patch to the latest version of VSA. ------------------------------------------------------------------------ Details ------------------------------------------------------------------------ https://www.securify.nl/advisory/SFY20170504/authentication-bypass-in-kaseya-vsa.html
Powered by blists - more mailing lists