Skip to content

Commit 954d49d

Browse files
authored
Add CVE-2021-30116 (KEV and vKEV)
1 parent f7f7d9d commit 954d49d

File tree

1 file changed

+71
-0
lines changed

1 file changed

+71
-0
lines changed

http/cves/2021/CVE-2021-30116.yaml

Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
id: CVE-2021-30116
2+
3+
info:
4+
name: Kaseya VSA < 9.5.7 - Credential Disclosure via Windows Agent
5+
author: daffainfo
6+
severity: critical
7+
description: |
8+
Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system.
9+
remediation: |
10+
Update to version 9.5.7 or later to remediate this vulnerability.
11+
reference:
12+
- https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/
13+
- https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/
14+
- https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021
15+
- https://www.secpod.com/blog/kaseya-vsa-zero-day-by-revil/
16+
- https://nvd.nist.gov/vuln/detail/CVE-2021-30116
17+
classification:
18+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
19+
cvss-score: 10.0
20+
cve-id: CVE-2021-30116
21+
cwe-id: CWE-522
22+
cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*
23+
metadata:
24+
verified: true
25+
vendor: kaseya
26+
product: virtual_system_administrator
27+
shodan-query: http.favicon.hash:-1445519482
28+
tags: cve,cve2021,kaseya,virtual_system_administrator,kev,vkev
29+
30+
flow: |
31+
http(1)
32+
for (let mkdefault_id of iterate(template.id)) {
33+
set("mkdefault_id", mkdefault_id)
34+
http(2)
35+
}
36+
37+
http:
38+
- method: GET
39+
path:
40+
- "{{BaseURL}}/dl.asp"
41+
42+
matchers:
43+
- type: dsl
44+
dsl:
45+
- "contains_all(body, '<title>Download Agent</title>', 'mkDefault.asp?id=')"
46+
- "status_code == 200"
47+
condition: and
48+
internal: true
49+
50+
extractors:
51+
- type: regex
52+
name: id
53+
group: 1
54+
internal: true
55+
regex:
56+
- 'mkDefault\.asp\?id=([0-9-]+)'
57+
58+
- method: GET
59+
path:
60+
- "{{BaseURL}}/mkDefault.asp?id={{mkdefault_id}}"
61+
62+
matchers-condition: and
63+
matchers:
64+
- type: regex
65+
part: header
66+
regex:
67+
- "Location: /install/VSA-default-([0-9-]+)/KcsSetup\\.exe"
68+
69+
- type: status
70+
status:
71+
- 302

0 commit comments

Comments
 (0)