Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
Metrics
Affected Vendors & Products
References
History
Mon, 31 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 31 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2. | |
Title | Mobile Security Framework (MobSF) has a SSRF Vulnerability fix bypass on assetlinks_check with DNS Rebinding | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-31T18:16:45.085Z
Reserved: 2025-03-26T15:04:52.624Z
Link: CVE-2025-31116

Updated: 2025-03-31T18:16:22.767Z

Status : Awaiting Analysis
Published: 2025-03-31T17:15:42.663
Modified: 2025-04-01T20:26:22.890
Link: CVE-2025-31116

No data.