Описание
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-2892
- http://community.landesk.com/support/docs/DOC-21767
- http://secunia.com/advisories/42188
- http://securitytracker.com/id?1024728
- http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability
- http://www.exploit-db.com/exploits/15488
- http://www.securityfocus.com/archive/1/514728/100/0/threaded
- http://www.securityfocus.com/bid/44781
- http://www.vupen.com/english/advisories/2010/2957
Связанные уязвимости
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.