CVE-2021-30118
📋 TL;DR
CVE-2021-30118 is an unauthenticated arbitrary file upload vulnerability in Kaseya VSA that allows remote attackers to upload malicious ASP.NET files and execute arbitrary code with web server privileges. This affects Kaseya VSA Unified Remote Monitoring & Management (RMM) version 9.5.4.2149. Attackers can achieve full system compromise without authentication.
💻 Affected Systems
- Kaseya VSA Unified Remote Monitoring & Management (RMM)
📦 What is this software?
Vsa by Kaseya
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise leading to data theft, ransomware deployment, credential harvesting, and lateral movement across the network.
Likely Case
Web shell deployment leading to persistent backdoor access, data exfiltration, and potential ransomware deployment.
If Mitigated
Limited impact with proper network segmentation, but still significant risk to the affected VSA server.
🎯 Exploit Status
Exploit requires simple HTTP POST request with crafted parameters. Session ID validation bypass allows any numeric cookie value.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.5.5 and later
Vendor Advisory: https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download and install Kaseya VSA version 9.5.5 or later from Kaseya support portal. 3. Restart the VSA service. 4. Verify the patch is applied by checking version.
🔧 Temporary Workarounds
Block access to vulnerable endpoint
allUse web application firewall or network firewall to block access to /SystemTab/uploader.aspx
# Example iptables rule for Linux: iptables -A INPUT -p tcp --dport 80 -m string --string "/SystemTab/uploader.aspx" --algo bm -j DROP
# Example Windows Firewall rule: New-NetFirewallRule -DisplayName "Block Kaseya Uploader" -Direction Inbound -Protocol TCP -LocalPort 80 -RemoteAddress Any -Action Block -Program "%SystemRoot%\system32\svchost.exe" -Service "http" -Profile Any
Restrict network access to VSA
allLimit VSA server access to trusted management networks only
# Configure firewall to allow only specific source IPs to access VSA port
# Example: iptables -A INPUT -p tcp --dport 80 -s 10.0.0.0/24 -j ACCEPT
# Example: iptables -A INPUT -p tcp --dport 80 -j DROP
🧯 If You Can't Patch
- Immediately isolate the VSA server from internet access and restrict to management VLAN only
- Implement strict file integrity monitoring on web directories and alert on new ASPX file creation
🔍 How to Verify
Check if Vulnerable:
Check if version is 9.5.4.2149 via VSA web interface or by examining installed software in Control Panel
Check Version:
Check VSA web interface login page or examine installed programs list for Kaseya VSA version
Verify Fix Applied:
Verify version is 9.5.5 or later and test that /SystemTab/uploader.aspx endpoint properly validates authentication
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /SystemTab/uploader.aspx with qqfile and PathData parameters
- Creation of new ASPX files in web directories
- Unusual process execution from w3wp.exe or IIS worker processes
Network Indicators:
- HTTP POST to /SystemTab/uploader.aspx with file upload parameters
- Subsequent requests to newly created ASPX files
- Unusual outbound connections from VSA server
SIEM Query:
source="web_server_logs" AND (uri="/SystemTab/uploader.aspx" AND method="POST") OR (file_creation AND extension=".aspx" AND path="*webroot*")
🔗 References
- https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/
- https://csirt.divd.nl/CVE-2021-30118
- https://csirt.divd.nl/DIVD-2021-00011
- https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021
- https://csirt.divd.nl/2021/07/07/Kaseya-Limited-Disclosure/
- https://csirt.divd.nl/CVE-2021-30118
- https://csirt.divd.nl/DIVD-2021-00011
- https://helpdesk.kaseya.com/hc/en-gb/articles/360019054377-9-5-5-Feature-Release-10-April-2021