Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
                
            References
                    Configurations
                    History
                    12 Jun 2025, 19:43
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Opensecurity Opensecurity mobile Security Framework | |
| CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
| Summary | 
 | |
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bd - Patch | |
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56 - Exploit, Vendor Advisory | 
31 Mar 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56 - | 
31 Mar 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-31 17:15
Updated : 2025-06-12 19:43
NVD link : CVE-2025-31116
Mitre link : CVE-2025-31116
CVE.ORG link : CVE-2025-31116
JSON object : View
Products Affected
                opensecurity
- mobile_security_framework
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
