Логотип exploitDog
bind:CVE-2025-24804
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-24804

Количество 3

Количество 3

nvd логотип

CVE-2025-24804

7 месяцев назад

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-jrm8-xgf3-fwqr

7 месяцев назад

MobSF Partial Denial of Service (DoS)

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-08880

7 месяцев назад

Уязвимость компонента urls.py фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 2.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-24804

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.3
0%
Низкий
7 месяцев назад
github логотип
GHSA-jrm8-xgf3-fwqr

MobSF Partial Denial of Service (DoS)

CVSS3: 6.5
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-08880

Уязвимость компонента urls.py фреймворка для исследования безопасности мобильных приложений Mobile Security Framework (MobSF), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 2.4
0%
Низкий
7 месяцев назад

Уязвимостей на страницу