First published: Fri Jul 09 2021(Updated: )
Semi-authenticated local file inclusion The contents of arbitrary files can be returned by the webserver Example request: `https://x.x.x.x/KLC/js/Kaseya.SB.JS/js.aspx?path=C:\Kaseya\WebPages\dl.asp` A valid sessionId is required but can be easily obtained via CVE-2021-30118
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kaseya VSA Agent | <9.5.6 |
Upgrade to a version above 9.5.6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30121 is classified as a medium severity vulnerability.
To mitigate CVE-2021-30121, upgrade Kaseya VSA to a version higher than 9.5.6.
CVE-2021-30121 is a semi-authenticated local file inclusion vulnerability.
Exploiting CVE-2021-30121 requires a valid sessionId, which can be obtained through CVE-2021-30118.
CVE-2021-30121 can potentially expose arbitrary file contents from the Kaseya VSA application.