gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://community.landesk.com/support/docs/DOC-21767 - Vendor Advisory | |
References | () http://secunia.com/advisories/42188 - Vendor Advisory | |
References | () http://securitytracker.com/id?1024728 - | |
References | () http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability - Exploit | |
References | () http://www.exploit-db.com/exploits/15488 - Exploit | |
References | () http://www.securityfocus.com/archive/1/514728/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/44781 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/2957 - Vendor Advisory |
Information
Published : 2010-11-15 21:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2892
Mitre link : CVE-2010-2892
CVE.ORG link : CVE-2010-2892
JSON object : View
Products Affected
landesk
- management_gateway
CWE
CWE-20
Improper Input Validation