Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In version 3.9.5 Beta and prior, MobSF does not perform any input validation when extracting the hostnames in `android:host`, so requests can also be sent to local hostnames. This can lead to server-side request forgery. An attacker can cause the server to make a connection to internal-only services within the organization's infrastructure. Commit 5a8eeee73c5f504a6c3abdf2a139a13804efdb77 has a hotfix for this issue.
History

Thu, 10 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Mobsf
Mobsf mobile Security Framework
CPEs cpe:2.3:a:mobsf:mobile_security_framework:*:*:*:*:*:*:*:*
Vendors & Products Mobsf
Mobsf mobile Security Framework
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-10T20:10:00.461Z

Reserved: 2024-03-18T17:07:00.094Z

Link: CVE-2024-29190

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:54.835Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-22T23:15:07.123

Modified: 2024-11-21T09:07:45.800

Link: CVE-2024-29190

cve-icon Redhat

No data.