Loading
Semi-authenticated local file inclusion The contents of arbitrary files can be returned by the webserver Example request: `https://x.x.x.x/KLC/js/Kaseya.SB.JS/js.aspx?path=C:\Kaseya\WebPages\dl.asp` A valid sessionId is required but can be easily obtained via CVE-2021-30118
Use CWE-829, Kaseya vendor hub and Vsa product page to widen CVE-2021-30121 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-30120, CVE-2021-30118 and CVE-2021-30117 for nearby disclosures in the same product family.