Semi-authenticated local file inclusion The contents of arbitrary files can be returned by the webserver Example request: `https://x.x.x.x/KLC/js/Kaseya.SB.JS/js.aspx?path=C:\Kaseya\WebPages\dl.asp` A valid sessionId is required but can be easily obtained via CVE-2021-30118
Solution:
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Link | Tags |
---|---|
https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/ | third party advisory patch |
https://csirt.divd.nl/DIVD-2021-00011 | third party advisory patch |
https://csirt.divd.nl/CVE-2021-30121 | third party advisory exploit |