First published: Fri Jul 09 2021(Updated: )
Authenticated reflective XSS in HelpDeskTab/rcResults.asp The parameter result of /HelpDeskTab/rcResults.asp is insecurely returned in the requested web page and can be used to perform a Cross Site Scripting attack Example request: `https://x.x.x.x/HelpDeskTab/rcResults.asp?result=<script>alert(document.cookie)</script>` The same is true for the parameter FileName of /done.asp Eaxmple request: `https://x.x.x.x/done.asp?FileName=";</script><script>alert(1);a="&PathData=&originalName=shell.aspx&FileSize=4388&TimeElapsed=00:00:00.078`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya VSA | <9.5.7 |
Upgrade to a version above 9.5.6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.