CVE-2025-24804

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24804
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24804.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24804
Aliases
Published
2025-02-05T19:15:46Z
Modified
2025-02-06T08:51:40.616403Z
Summary
[none]
Details

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the Info.plist file and add special characters to the <key>CFBundleIdentifier</key> value. When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/mobsf/mobile-security-framework-mobsf

Affected ranges

Type
GIT
Repo
https://github.com/mobsf/mobile-security-framework-mobsf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.8.1
0.8.8.2
0.9
0.9.1

v0.*

v0.9.2
v0.9.3
v0.9.3.1
v0.9.3.2
v0.9.3.3
v0.9.3.4
v0.9.3.5
v0.9.3.6
v0.9.3.7
v0.9.4
v0.9.4.1
v0.9.4.2
v0.9.5
v0.9.5.2
v0.9.5.4
v0.9.5.5

v1.*

v1.0.3Beta
v1.1.5
v1.1.6

v2.*

v2.0.0

v3.*

v3.0.0
v3.0.1
v3.0.5
v3.1.1
v3.2.6
v3.2.8
v3.2.9
v3.3.3
v3.3.5
v3.4.0
v3.4.3
v3.4.6
v3.5.0
v3.6.0
v3.6.9
v3.7.6
v3.9.7

v4.*

v4.0.7
v4.1.3
v4.3.0