CVE-2015-6922
CRITICALKaseya Virtual System Administrator < 7.0.0.33 - Authentication Bypass
Title source: ruleDescription
Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9 does not properly require authentication, which allows remote attackers to bypass authentication and (1) add an administrative account via crafted request to LocalAuth/setAccount.aspx or (2) write to and execute arbitrary files via a full pathname in the PathData parameter to ConfigTab/uploader.aspx.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/38401
exploitdb
WORKING POC
VERIFIED
by Pedro Ribeiro · textwebappsasp
https://www.exploit-db.com/exploits/38351
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/kaseya_master_admin.rb
metasploit
WORKING POC
EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/kaseya_uploader.rb
References (5)
Scores
CVSS v3
9.8
EPSS
0.7780
EPSS Percentile
99.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-287
Status
published
Products (1)
kaseya/virtual_system_administrator
7.0.0.0 - 7.0.0.33
Published
Feb 17, 2020
Tracked Since
Feb 18, 2026