CVE-2012-5878

Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.
References
Link Resource
https://www.htbridge.com/advisory/HTB23123 Not Applicable Third Party Advisory
https://www.htbridge.com/advisory/HTB23127 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulbsecurity:smartphone_pentest_framework:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-03 20:15

Updated : 2024-02-28 17:28


NVD link : CVE-2012-5878

Mitre link : CVE-2012-5878

CVE.ORG link : CVE-2012-5878


JSON object : View

Products Affected

bulbsecurity

  • smartphone_pentest_framework
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')