Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensecurity
Opensecurity mobile Security Framework |
|
| CPEs | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opensecurity
Opensecurity mobile Security Framework |
Mon, 31 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 31 Mar 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2. | |
| Title | Mobile Security Framework (MobSF) has a SSRF Vulnerability fix bypass on assetlinks_check with DNS Rebinding | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-31T16:42:42.618Z
Updated: 2025-03-31T18:16:45.085Z
Reserved: 2025-03-26T15:04:52.624Z
Link: CVE-2025-31116
Updated: 2025-03-31T18:16:22.767Z
Status : Analyzed
Published: 2025-03-31T17:15:42.663
Modified: 2025-06-12T19:43:33.257
Link: CVE-2025-31116
No data.