Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
References
Configurations
History
12 Jun 2025, 19:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Opensecurity
Opensecurity mobile Security Framework |
|
CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bd - Patch | |
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56 - Exploit, Vendor Advisory |
31 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56 - |
31 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 17:15
Updated : 2025-06-12 19:43
NVD link : CVE-2025-31116
Mitre link : CVE-2025-31116
CVE.ORG link : CVE-2025-31116
JSON object : View
Products Affected
opensecurity
- mobile_security_framework
CWE
CWE-918
Server-Side Request Forgery (SSRF)