Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.
References
Link | Resource |
---|---|
https://www.htbridge.com/advisory/HTB23123 | Not Applicable Third Party Advisory |
https://www.htbridge.com/advisory/HTB23127 | Exploit Third Party Advisory |
https://www.htbridge.com/advisory/HTB23123 | Not Applicable Third Party Advisory |
https://www.htbridge.com/advisory/HTB23127 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.htbridge.com/advisory/HTB23123 - Not Applicable, Third Party Advisory | |
References | () https://www.htbridge.com/advisory/HTB23127 - Exploit, Third Party Advisory |
Information
Published : 2020-01-03 20:15
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5878
Mitre link : CVE-2012-5878
CVE.ORG link : CVE-2012-5878
JSON object : View
Products Affected
bulbsecurity
- smartphone_pentest_framework
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')