Overview
Kaseya Virtual System Administrator (VSA), versions R9 and possibly earlier, contains arbitrary file download and open redirect vulnerabilities.
Description
| CWE-22: Improper Limitation of Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-2862 Kaseya VSA is an IT management platform with a help desk ticketing system. An authenticated attacker can traverse directories and download arbitrary files by submitting a specially crafted HTTP request to the server hosting the VSA software. | 
Impact
| A remote, authenticated attacker can download arbitrary files. A remote, unauthenticated attacker may be able to redirect users to arbitrary web sites. | 
Solution
| Apply an update 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N | 
| Temporal | 3.4 | E:POC/RL:OF/RC:C | 
| Environmental | 2.5 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
Thanks to Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security for reporting these vulnerabilities.
This document was written by Joel Land.
Other Information
| CVE IDs: | CVE-2015-2862, CVE-2015-2863 | 
| Date Public: | 2015-07-13 | 
| Date First Published: | 2015-07-13 | 
| Date Last Updated: | 2015-07-13 17:05 UTC | 
| Document Revision: | 13 |