Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j759-j745-p8g8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.

gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.

EPSS

Процентиль: 91%
0.06163
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
около 15 лет назад

gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.

EPSS

Процентиль: 91%
0.06163
Низкий

Дефекты

CWE-20