Vulnerability Description
antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Antsle | Antman | <= 0.9.0c |
Related Weaknesses (CWE)
References
- http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.htmlExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44220/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/44262/ExploitThird Party AdvisoryVDB Entry
- http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.htmlExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44220/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/44262/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-7739?
CVE-2018-7739 is a vulnerability with a CVSS score of 9.8 (CRITICAL). antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the ...
How severe is CVE-2018-7739?
CVE-2018-7739 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7739?
Check the references section above for vendor advisories and patch information. Affected products include: Antsle Antman.