Advisory Details

September 23rd, 2015

Kaseya Virtual System Administrator Authenticated Remote File Upload Remote Code Execution Vulnerability

ZDI-15-450
ZDI-CAN-2841

CVE ID CVE-2015-6589
CVSS SCORE 6.5, AV:N/AC:L/Au:S/C:P/I:P/A:P
AFFECTED VENDORS Kaseya
AFFECTED PRODUCTS Virtual System Administrator
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19680']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Kaseya Virtual System Administrator. Authentication is required to exploit this vulnerability.

The specific flaw exists within the json.ashx HTTP handler, which does not restrict destination file paths. Attackers can leverage this vulnerability to upload and execute arbitrary code on the server under the context of IIS.

ADDITIONAL DETAILS Kaseya has issued an update to correct this vulnerability. More details can be found at:
https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
DISCLOSURE TIMELINE
  • 2015-04-02 - Vulnerability reported to vendor
  • 2015-09-23 - Coordinated public release of advisory
CREDIT Pedro Ribeiro (pedrib@gmail.com) / Agile Information Security
BACK TO ADVISORIES