Kaseya VSA - Open Redirect vulnerability in versions 7.x, 8.x, 9.0, and 9.1 allows attackers to conduct phishing attacks by redirecting users to arbitrary websites via unspecified vectors. Apply the latest security patches and updates for remediation
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2015-2863 | 20 Jul 201523:59 | – | nvd |
![]() | CVE-2015-2863 | 20 Jul 201523:59 | – | cve |
![]() | Open redirect | 20 Jul 201523:59 | – | prion |
![]() | CVE-2015-2863 | 20 Jul 201523:00 | – | cvelist |
![]() | Kaseya Virtual System Administrator (VSA) - Multiple Vulnerabilities (1) | 15 Jul 201500:00 | – | exploitdb |
![]() | Kaseya Virtual System Administrator (VSA) - Multiple Vulnerabilities (1) | 15 Jul 201500:00 | – | exploitpack |
![]() | Kaseya Virtual System Administrator Multiple Vulnerabilities - Active Check | 17 Jul 201500:00 | – | openvas |
![]() | Kaseya Virtual System Administrator contains multiple vulnerabilities | 13 Jul 201500:00 | – | cert |
![]() | Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 27 Jul 201500:00 | – | securityvulns |
id: CVE-2015-2863
info:
name: Kaseya Virtual System Administrator - Open Redirect
author: 0x_Akoko,AmirHossein Raeisi
severity: medium
description: |
Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
remediation: |
Apply the latest security patches and updates provided by Kaseya to fix the open redirect vulnerability in the Kaseya Virtual System Administrator (VSA).
reference:
- https://github.com/pedrib/PoC/blob/3f927b957b86a91ce65b017c4b9c93d05e241592/advisories/Kaseya/kaseya-vsa-vuln.txt
- http://www.kb.cert.org/vuls/id/919604
- https://nvd.nist.gov/vuln/detail/CVE-2015-2863
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2015-2863
cwe-id: CWE-601
epss-score: 0.00626
epss-percentile: 0.76747
cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: kaseya
product: virtual_system_administrator
tags: cve2015,cve,redirect,kaseya
http:
- method: GET
path:
- '{{BaseURL}}/inc/supportLoad.asp?urlToLoad=http://oast.me'
- '{{BaseURL}}/vsaPres/Web20/core/LocalProxy.ashx?url=http://oast.me'
stop-at-first-match: true
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/idfD2e/1
# digest: 490a0046304402200cb21062adec56af4c5f99788b8c8d74375897eb38e751f1fda4a3a826fcbeab02207416f4476c56fa4d98abadfaeffb0296e5bd66f3235c7c5f0c15e06b60095a31:922c64590222798bb761d5b6d8e72950
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo