ID CVE-2015-2863
Summary Open redirect vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. <a href="http://cwe.mitre.org/data/definitions/601.html" rel="nofollow">CWE-601: URL Redirection to Untrusted Site ('Open Redirect')</a>
References
Vulnerable Configurations
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.26:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.26:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.27:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.27:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:7.0.0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:8.0.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.0.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:kaseya:virtual_system_administrator:9.1.0.3:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 05-02-2019 - 19:26)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
cert-vn VU#919604
Last major update 05-02-2019 - 19:26
Published 20-07-2015 - 23:59
Last modified 05-02-2019 - 19:26
Back to Top