Description Preview
Overview
This vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability stems from two critical security flaws in the Kaseya VSA system:
-
The /SystemTab/uploader.aspx API endpoint requires a sessionId cookie, but does not properly validate it. Any numeric value is accepted as valid, allowing authentication bypass.
-
Once authentication is bypassed, an attacker can control both the filename (via the qqfile parameter) and the destination path (via the PathData parameter) when uploading files.
These issues combined allow attackers to upload malicious files (such as web shells) to the server's web root directory, which can then be executed by accessing the corresponding URL. The vulnerability gives attackers the ability to execute code with the privileges of the web server process, potentially leading to complete system compromise.
Remediation
To remediate this vulnerability, organizations should:
-
Update Kaseya VSA to version 9.5.5 or later, which contains fixes for this vulnerability. The patch was released on April 10, 2021.
-
If immediate patching is not possible:
- Implement network segmentation to restrict access to the Kaseya VSA server
- Monitor for suspicious file uploads and execution attempts
- Consider temporarily disabling external access to the VSA server until patching is complete
-
After patching, conduct a thorough security review to identify any potential compromise that may have occurred before the vulnerability was addressed.
-
Review and strengthen authentication mechanisms for all web applications, ensuring proper session validation.
-
Apply the principle of least privilege to web server processes, limiting what directories they can write to.
References
- DIVD CSIRT Limited Disclosure: https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/
- DIVD CVE-2021-30118 Details: https://csirt.divd.nl/CVE-2021-30118
- DIVD Case DIVD-2021-00011: https://csirt.divd.nl/DIVD-2021-00011
- Kaseya VSA 9.5.5 Release Notes (containing the fix): https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade