First published: Fri Jul 09 2021(Updated: )
Semi-authenticated local file inclusion The contents of arbitrary files can be returned by the webserver Example request: `https://x.x.x.x/KLC/js/Kaseya.SB.JS/js.aspx?path=C:\Kaseya\WebPages\dl.asp` A valid sessionId is required but can be easily obtained via CVE-2021-30118
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya VSA | <9.5.6 |
Upgrade to a version above 9.5.6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.