高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-30116.yaml | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2021-30120 | 9.9 CRITICAL | 2FA bypass in Kaseya VSA <= v9.5.6 |
| CVE-2021-30118 | 9.8 CRITICAL | Unauthenticated Remote Code Execution in Kaseya VSA < v9.5.5 |
| CVE-2021-30117 | 9.8 CRITICAL | Authenticated SQL injection in Kaseya VSA < v9.5.6 |
| CVE-2021-23405 | 8.3 HIGH | SQL Injection |
| CVE-2021-30201 | 7.5 HIGH | Unauthenticated XML External Entity vulnerability in Kaseya VSA < v9.5.6 |
| CVE-2021-30121 | 6.5 MEDIUM | (Semi-)Authenticated local file inclusion in Kaseya VSA < v9.5.6 |
| CVE-2021-30119 | 5.4 MEDIUM | Authenticated Authenticated reflective XSS in Kaseya VSA <= v9.5.6 |
| CVE-2020-35986 | Rukovoditel 跨站脚本漏洞 | |
| CVE-2020-25875 | Codoforum 跨站脚本漏洞 | |
| CVE-2020-25392 | CSZ CMS 跨站脚本漏洞 | |
| CVE-2020-21333 | PublicCMS 跨站脚本漏洞 | |
| CVE-2020-35987 | Rukovoditel 跨站脚本漏洞 | |
| CVE-2021-35358 | Dotcms dotCMS 跨站脚本漏洞 | |
| CVE-2021-35361 | Dotcms dotCMS 跨站脚本漏洞 | |
| CVE-2021-35360 | Dotcms dotCMS 跨站脚本漏洞 | |
| CVE-2021-36371 | Emissary-Ingress 信任管理问题漏洞 | |
| CVE-2021-33214 | Hms Networks eCatcher 安全漏洞 | |
| CVE-2021-33792 | Foxit Reader 和 Foxit PhantomPDF 缓冲区错误漏洞 | |
| CVE-2021-33795 | Foxit Reader和Foxit PhantomPDF 安全漏洞 | |
| CVE-2021-27038 | Autodesk Design Review 安全漏洞 |
Showing 20 of 49 CVEs. View all on vendor page →
まだコメントはありません