CVE-2012-5878

Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.
References
Link Resource
https://www.htbridge.com/advisory/HTB23123 Not Applicable Third Party Advisory
https://www.htbridge.com/advisory/HTB23127 Exploit Third Party Advisory
https://www.htbridge.com/advisory/HTB23123 Not Applicable Third Party Advisory
https://www.htbridge.com/advisory/HTB23127 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulbsecurity:smartphone_pentest_framework:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () https://www.htbridge.com/advisory/HTB23123 - Not Applicable, Third Party Advisory () https://www.htbridge.com/advisory/HTB23123 - Not Applicable, Third Party Advisory
References () https://www.htbridge.com/advisory/HTB23127 - Exploit, Third Party Advisory () https://www.htbridge.com/advisory/HTB23127 - Exploit, Third Party Advisory

Information

Published : 2020-01-03 20:15

Updated : 2024-11-21 01:45


NVD link : CVE-2012-5878

Mitre link : CVE-2012-5878

CVE.ORG link : CVE-2012-5878


JSON object : View

Products Affected

bulbsecurity

  • smartphone_pentest_framework
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')