Vulnerability Details CVE-2018-7739
antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.089
EPSS Ranking 92.3%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2018-7739
-
cpe:2.3:a:antsle:antman:0.3.2
-
cpe:2.3:a:antsle:antman:0.4.0
-
cpe:2.3:a:antsle:antman:0.4.1
-
cpe:2.3:a:antsle:antman:0.5.0
-
cpe:2.3:a:antsle:antman:0.5.1
-
cpe:2.3:a:antsle:antman:0.5.2
-
cpe:2.3:a:antsle:antman:0.6.0
-
cpe:2.3:a:antsle:antman:0.8.1
-
cpe:2.3:a:antsle:antman:0.9.0
-
cpe:2.3:a:antsle:antman:0.9.0c