Full Disclosure mailing list archives
Code execution in Kaseya VSA
From: "Securify B.V. via Fulldisclosure" <fulldisclosure () seclists org>
Date: Sat, 13 Jan 2018 17:11:42 +0100
------------------------------------------------------------------------ Code execution in Kaseya VSA ------------------------------------------------------------------------ Kin Hung Cheng, Robert Hartshorn, May 2017 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ A security vulnerability was found in Kaseya VSA file upload file functionality. Using this vulnerability an authenticated user in a Kaseya VSA environment is able to upload arbitrary files onto the server. This functionality can lead to remote code execution with an asp shell. ------------------------------------------------------------------------ Tested versions ------------------------------------------------------------------------ This issue was successfully tested on version 9.2 ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ Patch to the latest version of VSA. ------------------------------------------------------------------------ Details ------------------------------------------------------------------------ https://www.securify.nl/advisory/SFY20170503/code-execution-in-kaseya-vsa.html _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Code execution in Kaseya VSA Securify B.V. via Fulldisclosure (Jan 13)