Описание
Authenticated reflective XSS in HelpDeskTab/rcResults.asp The parameter result of /HelpDeskTab/rcResults.asp is insecurely returned in the requested web page and can be used to perform a Cross Site Scripting attack Example request: https://x.x.x.x/HelpDeskTab/rcResults.asp?result=<script>alert(document.cookie)</script> The same is true for the parameter FileName of /done.asp Eaxmple request: https://x.x.x.x/done.asp?FileName=";</script><script>alert(1);a="&PathData=&originalName=shell.aspx&FileSize=4388&TimeElapsed=00:00:00.078
Ссылки
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 9.5.7 (исключая)
cpe:2.3:a:kaseya:vsa:*:*:*:*:-:*:*:*
EPSS
Процентиль: 45%
0.00223
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.4
github
больше 3 лет назад
Cross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7.
EPSS
Процентиль: 45%
0.00223
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79