First published: Fri Jul 09 2021(Updated: )
Authenticated reflective XSS in HelpDeskTab/rcResults.asp The parameter result of /HelpDeskTab/rcResults.asp is insecurely returned in the requested web page and can be used to perform a Cross Site Scripting attack Example request: `https://x.x.x.x/HelpDeskTab/rcResults.asp?result=<script>alert(document.cookie)</script>` The same is true for the parameter FileName of /done.asp Eaxmple request: `https://x.x.x.x/done.asp?FileName=";</script><script>alert(1);a="&PathData=&originalName=shell.aspx&FileSize=4388&TimeElapsed=00:00:00.078`
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya VSA Agent | <9.5.7 |
Upgrade to a version above 9.5.6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30119 is classified as a medium severity vulnerability due to its potential for authenticated reflective XSS attacks.
To fix CVE-2021-30119, ensure that the 'result' parameter in the rcResults.asp file is properly sanitized before being rendered on the webpage.
CVE-2021-30119 affects Kaseya VSA versions prior to 9.5.7.
CVE-2021-30119 can facilitate Cross Site Scripting (XSS) attacks through the insecure handling of user input.
CVE-2021-30119 is an authenticated vulnerability, meaning that an attacker must be logged in to exploit it.