antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/44262/ | exploit vdb entry third party advisory |
http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html | third party advisory exploit |
https://www.exploit-db.com/exploits/44220/ | exploit vdb entry third party advisory |