what you don't know can hurt you

Kaseya 6.2 Cross Site Scripting

Kaseya 6.2 Cross Site Scripting
Posted Dec 1, 2012
Authored by Cartel

Kaseya version 6.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0d199c86dc9c0ba6e3bf9045283cf42d

Kaseya 6.2 Cross Site Scripting

Change Mirror Download
--------------------------------------------------------------------------------------------------
REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED
REDACTED REDACTED REDACTED REDACTED
ADVISORY ADVISORY ADVISORY ADVISORY ADVISORY ADVISORY ADVISORY
ADVISORY ADVISORY ADVISORY ADVISORY
--------------------------------------------------------------------------------------------------

RA005: Persistent XSS Injection Vulnerability in Kaseya 6.2

Background
----------

At Kiwicon 6 in my talk "Managed Service Pwnage", I demonstrated
trivial flaws in Kaseya, ManageEngine and
N-Central that could all be used to gain admin access. In accordance
with responsible disclosure
policy, no exploit code was released.

The intention of these demonstrations was to get the MSP industry as a
whole to wake up and take
security seriously. It's evident from my cursory research that nobody
in this industry does, as
none of the flaws demonstrated would have been present.

RA005-1: Persistent XSS Injection via TempPath Variable in Kaseya Agent
--------------------------------------------------------------------------------

A persistent XSS injection vulnerability was discovered in Kaseya
using the Kaseya Agent as an injection vector.
Specifically, it was found that the contents of the TempPath registry
key was posted directly to the server
with no validation. Furthermore, when displaying the value, no url
encoding was performed.

Steps to reproduce:
1. Install the Kaseya Agent on a test computer.
2. Stop the Kaseya Agent service.
3. Setting the TempPath registry key to c:\kw<script>alert('xss')</script>orking
4. Restart the Kaseya Agent and allow it to log in.
5. Mouseover the agent's icon in the kaseya console.
6. Observe the 'xss' popup.


Timeline
--------

September 2012: Vulnerability discovered.
November 17, 2012: Vulnerability demonstrated publically at Kiwicon 6.
Details of vulnerability confidentially disclosed
to Kaseya representative present.
November 19, 2012: Kaseya releases HotFix 2690: "Optimize script
injection handling in agent working folder path".
November 20, 2012: Script injection flaw confirmed fixed.
December 1, 2012: Advisory posted to full-disclosure, as well as
published on the web at the following URL:

http://www.redacted.co.nz/a/9b44949b9cfecbbefaa06dfdd3a48d5c9949989f1ca67d007163ed7cf7df8104


Suggested Reading
-----------------

For the Kaseya Dev Team :-)

OWASP Top Ten: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
Web App Hackers Handbook 2nd Edition: http://mdsec.net/wahh/


About Kaseya
------------

from Wikipedia:

Kaseya is an international company that produces remote-management
software for the IT industry.
It develops and sells commercial software to remotely manage and
monitor computers running Windows,
OSX, and Linux operating systems.


About REDACTED
--------------

;)


Login or Register to add favorites

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    1 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    20 Files
  • 28
    Sep 28th
    19 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close