CVE-2015-6922
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
17/02/2020
Last modified:
26/02/2020
Description
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* | 7.0.0.0 (including) | 7.0.0.33 (excluding) |
| cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* | 8.0.0.0 (including) | 8.0.0.23 (excluding) |
| cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* | 9.0.0.0 (including) | 9.0.0.19 (excluding) |
| cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:* | 9.1.0.0 (including) | 9.1.0.9 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html
- http://www.zerodayinitiative.com/advisories/ZDI-15-448
- http://www.zerodayinitiative.com/advisories/ZDI-15-449
- https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
- https://www.exploit-db.com/exploits/38351/



