← Back to CVEs
CVE-2018-7739
N/ADescription
antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
CVE Details
CVSS v3.1 ScoreN/A
Published3/7/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
antsle:antman
Weaknesses (CWE)
CWE-20
References
https://www.exploit-db.com/exploits/44220/(cve@mitre.org)
https://www.exploit-db.com/exploits/44262/(cve@mitre.org)
http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44220/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44262/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.