### [CVE-2018-7739](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7739) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description antsle antman before 0.9.1a allows remote attackers to bypass authentication via invalid characters in the username and password parameters, as demonstrated by a username=>&password=%0a string to the /login URI. This allows obtaining root permissions within the web management console, because the login process uses Java's ProcessBuilder class and a bash script called antsle-auth with insufficient input validation. ### POC #### Reference - http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html - http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html - https://www.exploit-db.com/exploits/44220/ - https://www.exploit-db.com/exploits/44220/ - https://www.exploit-db.com/exploits/44262/ - https://www.exploit-db.com/exploits/44262/ #### Github No PoCs found on GitHub currently.