Advisory Details

September 23rd, 2015

Kaseya Virtual System Administrator Remote File Upload Remote Code Execution Vulnerability

ZDI-15-449
ZDI-CAN-2840

CVE ID CVE-2015-6922
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Kaseya
AFFECTED PRODUCTS Virtual System Administrator
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19680']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Kaseya Virtual System Administrator. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the uploader.aspx page, which does not properly require that users be authenticated and does not restrict destination file paths. Attackers can leverage this vulnerability to upload and execute arbitrary code on the server under the context of IIS.

ADDITIONAL DETAILS Kaseya has issued an update to correct this vulnerability. More details can be found at:
https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
DISCLOSURE TIMELINE
  • 2015-04-02 - Vulnerability reported to vendor
  • 2015-09-23 - Coordinated public release of advisory
CREDIT Pedro Ribeiro (pedrib@gmail.com) / Agile Information Security
BACK TO ADVISORIES