
CVE-2021-30118 Scanner
CVE-2021-30118 Scanner - Remote Code Execution (RCE) vulnerability in Kaseya VSA
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
19 days 16 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
Kaseya VSA is a comprehensive IT management platform used by managed service providers (MSPs) and enterprise IT departments. It offers features for monitoring, managing, and automating IT environments from a unified interface. This software is predominantly employed for remote management of workstations, servers, and network devices, facilitating tasks like patch management, software deployment, and remote support. Integrated into the operations of businesses globally, Kaseya VSA provides significant efficiency enhancements in IT operations. The software's flexibility and integration capabilities have made it integral in complex IT infrastructures. Its usage spans across various industries demanding robust IT management solutions.
The Remote Code Execution (RCE) vulnerability identified in Kaseya VSA allows attackers to execute arbitrary code on the vulnerable server. This critical flaw arises from an unauthenticated arbitrary file upload mechanism in the Kaseya VSA software. The vulnerable endpoint '/SystemTab/uploader.aspx' incorrectly manages file uploads, permitting the execution of hostile code. Attackers exploit this by uploading malicious scripts which are subsequently executed in the context of the web server. This breach can compromise a system's confidentiality, integrity, and availability. If exploited, it poses severe threats, including unauthorized data access and control over the entire system.
Technically, the vulnerability occurs as the '/SystemTab/uploader.aspx' endpoint allows unauthenticated users to upload files with arbitrary content. It uses the 'qqfile' parameter to dictate filename and 'PathData' for the directory where the file is saved. Although a sessionId cookie is required, the server fails to validate its authenticity, enabling the bypass of authentication mechanisms. This allows the attacker to upload files to the server's writable directories. Subsequently, malicious scripts can be executed, granting attackers unauthorized access and control. The exploitation involves constructing a POST request that leverages these vulnerable parameters to execute commands.
Exploitation of this vulnerability can have catastrophic effects on the targeted host. Attackers can achieve complete control over the server, potentially altering, deleting, or stealing sensitive information. It exposes organizations to data breaches, operational disruptions, and possible compliance violations. The impact is significant as the compromise of one system could lead to further breaches within the network. Such vulnerabilities can also be a foothold for lateral movement across IT infrastructures. Organizations could face severe financial and reputational damage due to unauthorized system access and data exfiltration.
REFERENCES