Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostingPath parameter to (1) SEAttack.pl or (2) CSAttack.pl in frameworkgui/ or the (3) appURLPath parameter to frameworkgui/attachMobileModem.pl.
References
Link | Resource |
---|---|
https://www.htbridge.com/advisory/HTB23123 | Not Applicable Third Party Advisory |
https://www.htbridge.com/advisory/HTB23127 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-01-03 12:15
Updated : 2020-01-15 09:06
NVD link : CVE-2012-5878
Mitre link : CVE-2012-5878
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
bulbsecurity
- smartphone_pentest_framework