Overview
Kaseya Virtual System Administrator (VSA), versions R9 and possibly earlier, contains arbitrary file download and open redirect vulnerabilities.
Description
CWE-22: Improper Limitation of Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2862 Kaseya VSA is an IT management platform with a help desk ticketing system. An authenticated attacker can traverse directories and download arbitrary files by submitting a specially crafted HTTP request to the server hosting the VSA software. |
Impact
A remote, authenticated attacker can download arbitrary files. A remote, unauthenticated attacker may be able to redirect users to arbitrary web sites. |
Solution
Apply an update
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Temporal | 3.4 | E:POC/RL:OF/RC:C |
Environmental | 2.5 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security for reporting these vulnerabilities.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2015-2862, CVE-2015-2863 |
Date Public: | 2015-07-13 |
Date First Published: | 2015-07-13 |
Date Last Updated: | 2015-07-13 17:05 UTC |
Document Revision: | 13 |