Advisory Details

September 23rd, 2015

Kaseya Virtual System Administrator Remote Privilege Escalation Vulnerability

ZDI-15-448
ZDI-CAN-2754

CVE ID CVE-2015-6922
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Kaseya
AFFECTED PRODUCTS Virtual System Administrator
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19674']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Kaseya Virtual System Administrator. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the forwarding service's handing of the setAccount.aspx page, which does not properly enforce that users be authenticated before manipulating user accounts. Attackers can use this vulnerability to become "Master Admin" in the application and execute arbitrary code on all managed devices.

ADDITIONAL DETAILS Kaseya has issued an update to correct this vulnerability. More details can be found at:
https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
DISCLOSURE TIMELINE
  • 2015-04-02 - Vulnerability reported to vendor
  • 2015-09-23 - Coordinated public release of advisory
CREDIT Pedro Ribeiro (pedrib@gmail.com) / Agile Information Security
BACK TO ADVISORIES