Kaseya VSA XSS / Brute Force

Kaseya VSA version suffers from cross site scripting and brute forcing vulnerabilities.

MD5 | 422ace8363b61c9858ef75bd8a974044




Affected version:
Kaseya VSA v6.5.0.0.

Vulnerability details:

1. The "forgot password" function at https://[target]/access/logon.asp
reveals whether a username is valid/exists or not, which assists with
brute force attacks. An incorrect username responds with aNo record of
this user existsa, where a valid username returns aThe system emailed
you a link. Visit it to change your password.a

This makes it much easier to brute force accounts.

2. The password reset URL, such as
https://[target]/access/resetAccount.asp?id=26756180, is not
significantly complex to prevent brute force attacks. The software
should use a GUID (5.3A10^36 combinations) globally unique value
instead to prevent brute force. The server response permits data
matching to ascertain whether a guessed id value is valid or not.

3. The URL at https://[target]/access/accessRoot.asp?page=logon.asp
contains a cross-site scripting vulnerability. Authentication cookies
may be stolen or malicious HTML or JavaScript etc injected to abuse
the client web browser.




Vulnerability discovered by Patrick Webster

Disclosure timeline:

20-Aug-2014 - Discovered during audit.
24-Aug-2014 -Sent to vendor.
25-Aug-2014 - Vendor response.
15-Oct-2014 - Vendor partially patched. Additional fixes due in 2
weeks. version
04-Apr-2017 - Public disclosure.

About OSI Security:

OSI Security is an independent network and computer security auditing
and consulting company based in Sydney, Australia. We provide internal
and external penetration testing, vulnerability auditing and wireless
site audits, vendor product assessments, secure network design,
forensics and risk mitigation services.

We can be found at http://www.osisecurity.com.au/

Related Posts