[<prev] [next>] [day] [month] [year] [list]
Message-ID: <76322e69-5415-c134-644e-4e7c32920ecd@securify.nl>
Date: Sat, 13 Jan 2018 17:11:30 +0100
From: "Securify B.V." <lists@...urify.nl>
To: bugtraq@...urityfocus.com
Subject: Code execution in Kaseya VSA
------------------------------------------------------------------------
Code execution in Kaseya VSA
------------------------------------------------------------------------
Kin Hung Cheng, Robert Hartshorn, May 2017
------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A security vulnerability was found in Kaseya VSA file upload file
functionality. Using this vulnerability an authenticated user in a
Kaseya VSA environment is able to upload arbitrary files onto the
server. This functionality can lead to remote code execution with an asp
shell.
------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on version 9.2
------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
Patch to the latest version of VSA.
------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.nl/advisory/SFY20170503/code-execution-in-kaseya-vsa.html
Powered by blists - more mailing lists