Логотип exploitDog
bind:CVE-2025-24803
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-24803

Количество 3

Количество 3

nvd логотип

CVE-2025-24803

7 месяцев назад

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-cxqq-w3x5-7ph3

7 месяцев назад

MobSF Stored Cross-Site Scripting (XSS)

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2025-08881

7 месяцев назад

Уязвимость компонента dynamic_analysis.html фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-24803

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 5.4
0%
Низкий
7 месяцев назад
github логотип
GHSA-cxqq-w3x5-7ph3

MobSF Stored Cross-Site Scripting (XSS)

CVSS3: 8.1
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-08881

Уязвимость компонента dynamic_analysis.html фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю провести атаку межсайтового скриптинга

CVSS3: 6.1
0%
Низкий
7 месяцев назад

Уязвимостей на страницу