Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-24803

Опубликовано: 05 фев. 2025
Источник: nvd
CVSS3: 5.4
EPSS Низкий

Описание

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the Info.plist file and add special characters to the <key>CFBundleIdentifier</key> value. The dynamic_analysis.html file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:opensecurity:mobile_security_framework:4.3.0:*:*:*:*:*:*:*

EPSS

Процентиль: 33%
0.00127
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 8.1
github
7 месяцев назад

MobSF Stored Cross-Site Scripting (XSS)

CVSS3: 6.1
fstec
7 месяцев назад

Уязвимость компонента dynamic_analysis.html фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю провести атаку межсайтового скриптинга

EPSS

Процентиль: 33%
0.00127
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-79