Vulnerability CVE-2010-2892


Published: 2010-11-15   Modified: 2012-02-13

Description:
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.

See advisories in our WLB2 database:
Topic
Author
Date
High
Landesk OS command injection
Aureliano Calvo
18.11.2010

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.5/10
10/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Landesk -> Management gateway 

 References:
http://community.landesk.com/support/docs/DOC-21767
http://securitytracker.com/id?1024728
http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability
http://www.exploit-db.com/exploits/15488
http://www.securityfocus.com/archive/1/514728/100/0/threaded
http://www.securityfocus.com/bid/44781
http://www.vupen.com/english/advisories/2010/2957

Copyright 2024, cxsecurity.com

 

Back to Top