CVE-2010-2892
LANDesk Management Gateway <4.0-1.48 & <4.2-1.8 - Command Injection
Title source: llmDescription
gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Aureliano Calvo · textwebappsphp
https://www.exploit-db.com/exploits/15488
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/514728/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1024728
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/2957
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/42188
Vendor Advisory x_refsource_confirm
http://community.landesk.com/support/docs/DOC-21767
Exploit x_refsource_misc
http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/44781
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15488
Scores
EPSS
0.0911
EPSS Percentile
92.7%
Details
CWE
CWE-20
Status
published
Products (4)
landesk/management_gateway
4.0
landesk/management_gateway
4.0-1.48
landesk/management_gateway
4.2
landesk/management_gateway
4.2-1.8
Published
Nov 15, 2010
Tracked Since
Feb 18, 2026