gsb/drivers.php in LANDesk Management Gateway 4.0 through 4.0-1.48 and 4.2 through 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request forgery (CSRF) attack.
community.landesk.com/support/docs/DOC-21767
secunia.com/advisories/42188
securitytracker.com/id?1024728
www.coresecurity.com/content/landesk-os-command-injection-vulnerability
www.exploit-db.com/exploits/15488
www.securityfocus.com/archive/1/514728/100/0/threaded
www.securityfocus.com/bid/44781
www.vupen.com/english/advisories/2010/2957