Логотип exploitDog
bind:CVE-2025-58161
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-58161

Количество 2

Количество 2

nvd логотип

CVE-2025-58161

5 месяцев назад

MobSF is a mobile application security testing tool used. In version 4.4.0, the GET /download/ route uses string path verification via os.path.commonprefix, which allows an authenticated user to download files outside the DWD_DIR download directory from "neighboring" directories whose absolute paths begin with the same prefix as DWD_DIR (e.g., .../downloads_bak, .../downloads.old). This is a Directory Traversal (escape) leading to a data leak. This issue has been patched in version 4.4.1.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-ccc3-fvfx-mw3v

5 месяцев назад

MobSF Path Traversal in GET /download/<filename> using absolute filenames

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-58161

MobSF is a mobile application security testing tool used. In version 4.4.0, the GET /download/ route uses string path verification via os.path.commonprefix, which allows an authenticated user to download files outside the DWD_DIR download directory from "neighboring" directories whose absolute paths begin with the same prefix as DWD_DIR (e.g., .../downloads_bak, .../downloads.old). This is a Directory Traversal (escape) leading to a data leak. This issue has been patched in version 4.4.1.

CVSS3: 4.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-ccc3-fvfx-mw3v

MobSF Path Traversal in GET /download/<filename> using absolute filenames

0%
Низкий
5 месяцев назад

Уязвимостей на страницу