Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.0.0.0 before 7.0.0.33, 8..0.0.0 before 8.0.0.23, 9.0.0.0 before 9.0.0.19, and 9.1.0.0 before 9.1.0.9 allows remote authenticated users to write to and execute arbitrary files due to insufficient restrictions in file paths to json.ashx.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-450 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/38351/ | Exploit Third Party Advisory VDB Entry |
https://www.securityfocus.com/bid/76838 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-13T20:11:27
Updated: 2020-02-13T20:11:27
Reserved: 2015-08-21T00:00:00
Link: CVE-2015-6589
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-13T21:15:11.597
Modified: 2020-02-25T18:32:12.260
Link: CVE-2015-6589
JSON object: View
Redhat Information
No data.
CWE