### [CVE-2018-5386](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5386) ![](https://img.shields.io/static/v1?label=Product&message=Infinity&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.22.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-288&color=brighgreen) ### Description Some Navarino Infinity functions, up to version 2.2, placed in the URL can bypass any authentication mechanism leading to an information leak. ### POC #### Reference - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 - https://medium.com/@evstykas/pwning-ships-vsat-for-fun-and-profit-ba0fe9f42fb3 - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html - https://packetstormsecurity.com/files/146506/Navarino-Infinity-Blind-SQL-Injection-Session-Fixation.html #### Github No PoCs found on GitHub currently.