First published: Mon Jul 20 2015(Updated: )
Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote authenticated users to read arbitrary files via a crafted HTTP request.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya VSA Agent | >=7.0<7.0.0.29 | |
Kaseya VSA Agent | >=8.0<8.0.0.18 | |
Kaseya VSA Agent | >=9.0<9.0.0.14 | |
Kaseya VSA Agent | >=9.1<9.1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2862 is considered a high severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2015-2862, upgrade the Kaseya Virtual System Administrator to a version 7.0.0.29 or later, 8.0.0.18 or later, 9.0.0.14 or later, or 9.1.0.4 or later.
CVE-2015-2862 is classified as a directory traversal vulnerability.
Users of Kaseya Virtual System Administrator versions prior to 7.0.0.29, 8.0.0.18, 9.0.0.14, and 9.1.0.4 are affected by CVE-2015-2862.
Attackers can exploit CVE-2015-2862 to read arbitrary files on the server by sending crafted HTTP requests.