Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the ipAddressTB parameter to (1) remoteAttack.pl or (2) guessPassword.pl in frameworkgui/; the filename parameter to (3) CSAttack.pl or (4) SEAttack.pl in frameworkgui/; the phNo2Attack parameter to (5) CSAttack.pl or (6) SEAttack.pl in frameworkgui/; the (7) platformDD2 parameter to frameworkgui/SEAttack.pl; the (8) agentURLPath or (9) agentControlKey parameter to frameworkgui/attach2agents.pl; or the (10) controlKey parameter to frameworkgui/attachMobileModem.pl. NOTE: The hostingPath parameter to CSAttack.pl and SEAttack.pl vectors and the appURLPath parameter to attachMobileModem.pl vector are covered by CVE-2012-5878.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.htbridge.com/advisory/HTB23123 | Exploit Third Party Advisory | 
| https://www.htbridge.com/advisory/HTB23123 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.htbridge.com/advisory/HTB23123 - Exploit, Third Party Advisory | 
Information
                Published : 2020-01-03 20:15
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5693
Mitre link : CVE-2012-5693
CVE.ORG link : CVE-2012-5693
JSON object : View
Products Affected
                bulbsecurity
- smartphone_pentest_framework
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
