← Retour aux CVEs
CVE-2018-7739
N/ADescription
antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
Details CVE
Score CVSS v3.1N/A
Publie3/7/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
antsle:antman
Faiblesses (CWE)
CWE-20
References
https://www.exploit-db.com/exploits/44220/(cve@mitre.org)
https://www.exploit-db.com/exploits/44262/(cve@mitre.org)
http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44220/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44262/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.