Описание
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:landesk:management_gateway:4.0:*:*:*:*:*:*:*
cpe:2.3:h:landesk:management_gateway:4.0-1.48:*:*:*:*:*:*:*
cpe:2.3:h:landesk:management_gateway:4.2:*:*:*:*:*:*:*
cpe:2.3:h:landesk:management_gateway:4.2-1.8:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06163
Низкий
8.5 High
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
EPSS
Процентиль: 91%
0.06163
Низкий
8.5 High
CVSS2
Дефекты
CWE-20