Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 12 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Opensecurity
         Opensecurity mobile Security Framework  | 
|
| CPEs | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Opensecurity
         Opensecurity mobile Security Framework  | 
Mon, 31 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 31 Mar 2025 17:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2. | |
| Title | Mobile Security Framework (MobSF) has a SSRF Vulnerability fix bypass on assetlinks_check with DNS Rebinding | |
| Weaknesses | CWE-918 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-31T16:42:42.618Z
Updated: 2025-03-31T18:16:45.085Z
Reserved: 2025-03-26T15:04:52.624Z
Link: CVE-2025-31116
Updated: 2025-03-31T18:16:22.767Z
Status : Analyzed
Published: 2025-03-31T17:15:42.663
Modified: 2025-06-12T19:43:33.257
Link: CVE-2025-31116
No data.
ReportizFlow