Логотип exploitDog
bind:CVE-2025-24803
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-24803

Количество 3

Количество 3

nvd логотип

CVE-2025-24803

около 1 года назад

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-cxqq-w3x5-7ph3

около 1 года назад

MobSF Stored Cross-Site Scripting (XSS)

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2025-08881

около 1 года назад

Уязвимость компонента dynamic_analysis.html фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-24803

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 5.4
0%
Низкий
около 1 года назад
github логотип
GHSA-cxqq-w3x5-7ph3

MobSF Stored Cross-Site Scripting (XSS)

CVSS3: 8.1
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-08881

Уязвимость компонента dynamic_analysis.html фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
0%
Низкий
около 1 года назад

Уязвимостей на страницу