{ "schema_version": "1.4.0", "id": "GHSA-j759-j745-p8g8", "modified": "2022-05-14T02:43:43Z", "published": "2022-05-14T02:43:43Z", "aliases": [ "CVE-2010-2892" ], "details": "gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2892" }, { "type": "WEB", "url": "http://community.landesk.com/support/docs/DOC-21767" }, { "type": "WEB", "url": "http://secunia.com/advisories/42188" }, { "type": "WEB", "url": "http://securitytracker.com/id?1024728" }, { "type": "WEB", "url": "http://www.coresecurity.com/content/landesk-os-command-injection-vulnerability" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/15488" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/514728/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/44781" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2957" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-11-15T21:00:00Z" } }