Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.htbridge.com/advisory/HTB23123 | Not Applicable Third Party Advisory | 
| https://www.htbridge.com/advisory/HTB23127 | Exploit Third Party Advisory | 
| https://www.htbridge.com/advisory/HTB23123 | Not Applicable Third Party Advisory | 
| https://www.htbridge.com/advisory/HTB23127 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.htbridge.com/advisory/HTB23123 - Not Applicable, Third Party Advisory | |
| References | () https://www.htbridge.com/advisory/HTB23127 - Exploit, Third Party Advisory | 
Information
                Published : 2020-01-03 20:15
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5878
Mitre link : CVE-2012-5878
CVE.ORG link : CVE-2012-5878
JSON object : View
Products Affected
                bulbsecurity
- smartphone_pentest_framework
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
